First published: Thu Feb 13 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG files within CovertToPDF. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9102.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader for Windows | <=9.7.0.29478 | |
Microsoft Windows | ||
Foxit PhantomPDF | <=9.7.0.29455 | |
Foxit PDF Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8844 is rated as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2020-8844, update Foxit Reader to version 9.7.0.29478 or later and Foxit PhantomPDF to version 9.7.0.29455 or later.
Exploitation of CVE-2020-8844 could allow attackers to execute arbitrary code on the affected systems.
CVE-2020-8844 affects Foxit Reader versions prior to 9.7.0.29478 and Foxit PhantomPDF versions prior to 9.7.0.29455.
Yes, user interaction is required as the target must visit a malicious page or open a malicious file to exploit CVE-2020-8844.