First published: Thu Sep 17 2020(Updated: )
An arbitrary code execution vulnerability exists in the rendering functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242. When drawing the contents of a page using colors from an indexed colorspace, the application can miscalculate the size of a buffer when allocating space for its colors. When using this allocated buffer, the application can write outside its bounds and cause memory corruption which can lead to code execution. A specially crafted document must be loaded by a victim in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gonitro Nitro Pro | =13.13.2.242 | |
Gonitro Nitro Pro | =13.16.2.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6116 is an arbitrary code execution vulnerability in the rendering functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242.
The severity of CVE-2020-6116 is high with a score of 7.8.
CVE-2020-6116 occurs when drawing the contents of a page using colors from an indexed colorspace, causing a miscalculation in the size of a buffer when allocating space for colors.
Gonitro Nitro Pro versions 13.13.2.242 and 13.16.2.300 are affected by CVE-2020-6116.
To fix CVE-2020-6116, users should update to a newer version of Nitro Pro that addresses the vulnerability.