First published: Fri Sep 04 2020(Updated: )
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Phantompdf | <=9.7.2.29539 | |
Microsoft Windows | ||
Foxitsoftware Phantompdf | <=10.0.0.35798 | |
Foxitsoftware Reader | <=10.0.0.35798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-11493.
The severity of CVE-2020-11493 is high with a severity value of 8.1.
Foxit Reader versions before 10.0.1, PhantomPDF versions before 10.0.1 and 9.7.3 are affected by CVE-2020-11493.
Attackers can obtain sensitive information in CVE-2020-11493 by exploiting an uninitialized object in Foxit Reader and PhantomPDF.
No, Microsoft Windows is not vulnerable to CVE-2020-11493.
You can find more information about CVE-2020-11493 on the Foxit Software security bulletins page at https://www.foxitsoftware.com/support/security-bulletins.php.