First published: Wed Aug 19 2020(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PNG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-10977.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Foxit Studio Photo | <=3.6.6.924 | |
Microsoft Windows | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-15630.
The title of this vulnerability is 'Foxit Studio Photo PNG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability'.
This vulnerability is an information disclosure vulnerability.
The severity of this vulnerability is high with a CVSS score of 7.8.
This vulnerability can be exploited by remote attackers who can disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.922 by tricking the user into visiting a malicious page or opening a malicious file.
The affected version of Foxit Studio Photo is 3.6.6.922 up to and including 3.6.6.924.
No, Microsoft Windows is not affected by this vulnerability.
Yes, you can find the security bulletin on the Foxit Software support website.
Yes, you can find the advisory on the Zero Day Initiative website.
The CWE ID for this vulnerability is 125.