Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://secunia.com/advisories/43329 | |
http://secunia.com/advisories/43440 | |
http://secunia.com/secunia_research/2011-14/ | |
http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory | Patch Vendor Advisory |
http://www.securitytracker.com/id?1025129 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2011/0508 | Not Applicable |
http://secunia.com/advisories/43329 | |
http://secunia.com/advisories/43440 | |
http://secunia.com/secunia_research/2011-14/ | |
http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory | Patch Vendor Advisory |
http://www.securitytracker.com/id?1025129 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2011/0508 | Not Applicable |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/43329 - | |
References | () http://secunia.com/advisories/43440 - | |
References | () http://secunia.com/secunia_research/2011-14/ - | |
References | () http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id?1025129 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0508 - Not Applicable |
Information
Published : 2011-02-25 19:00
Updated : 2024-11-21 01:23
NVD link : CVE-2011-0332
Mitre link : CVE-2011-0332
CVE.ORG link : CVE-2011-0332
JSON object : View
Products Affected
foxitsoftware
- foxit_phantom
- foxit_reader
CWE
CWE-189
Numeric Errors