First published: Fri Sep 04 2020(Updated: )
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Phantompdf | <=9.7.2.29539 | |
Microsoft Windows | ||
Foxitsoftware Phantompdf | <=10.0.0.35798 | |
Foxitsoftware Reader | <=10.0.0.35798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-12248.
CVE-2020-12248 has a severity level of 8.8, which is considered high.
This vulnerability occurs in Foxit Reader and PhantomPDF due to a heap-based buffer overflow that is caused by mishandling dirty image-resource data.
Foxit Reader versions up to and including 10.0.0.35798 and PhantomPDF versions up to and including 9.7.2.29539 are affected by CVE-2020-12248.
An attacker can exploit CVE-2020-12248 by executing arbitrary code through the heap-based buffer overflow.