Vulnerabilites related to Foxit - Foxit PhantomPDF
CVE-2018-17706 (GCVE-0-2018-17706)
Vulnerability from cvelistv5
Published
2018-10-29 22:00
Modified
2024-08-05 10:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - -Out-of-bounds Write
Summary
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within fxhtml2pdf. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6230.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Foxit | Foxit PhantomPDF |
Version: Phantom PDF 9.1.5096 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:54:10.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-1095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit PhantomPDF", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "Phantom PDF 9.1.5096" } ] } ], "datePublic": "2018-10-29T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within fxhtml2pdf. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6230." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787-Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-29T21:57:01", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-1095" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2018-17706", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Foxit PhantomPDF", "version": { "version_data": [ { "version_value": "Phantom PDF 9.1.5096" } ] } } ] }, "vendor_name": "Foxit" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within fxhtml2pdf. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6230." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787-Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.foxitsoftware.com/support/security-bulletins.php", "refsource": "CONFIRM", "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "name": "https://zerodayinitiative.com/advisories/ZDI-18-1095", "refsource": "MISC", "url": "https://zerodayinitiative.com/advisories/ZDI-18-1095" } ] } } } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2018-17706", "datePublished": "2018-10-29T22:00:00", "dateReserved": "2018-09-28T00:00:00", "dateUpdated": "2024-08-05T10:54:10.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-14295 (GCVE-0-2018-14295)
Vulnerability from cvelistv5
Published
2018-07-31 20:00
Modified
2024-08-05 09:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NO_CWE
Summary
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF documents. When parsing shading patterns, the process does not properly validate user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6223.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Foxit | Foxit PhantomPDF |
Version: Phantom PDF 9.1.5096 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:21:41.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-755" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit PhantomPDF", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "Phantom PDF 9.1.5096" } ] } ], "datePublic": "2018-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF documents. When parsing shading patterns, the process does not properly validate user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6223." } ], "problemTypes": [ { "descriptions": [ { "description": "NO_CWE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-31T19:57:01", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-755" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2018-14295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Foxit PhantomPDF", "version": { "version_data": [ { "version_value": "Phantom PDF 9.1.5096" } ] } } ] }, "vendor_name": "Foxit" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF documents. When parsing shading patterns, the process does not properly validate user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6223." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NO_CWE" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.foxitsoftware.com/support/security-bulletins.php", "refsource": "CONFIRM", "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "name": "https://zerodayinitiative.com/advisories/ZDI-18-755", "refsource": "MISC", "url": "https://zerodayinitiative.com/advisories/ZDI-18-755" } ] } } } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2018-14295", "datePublished": "2018-07-31T20:00:00", "dateReserved": "2018-07-16T00:00:00", "dateUpdated": "2024-08-05T09:21:41.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }