In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106306 | Third Party Advisory VDB Entry |
https://www.foxitsoftware.com/support/security-bulletins.php | Vendor Advisory |
http://www.securityfocus.com/bid/106306 | Third Party Advisory VDB Entry |
https://www.foxitsoftware.com/support/security-bulletins.php | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106306 - Third Party Advisory, VDB Entry | |
References | () https://www.foxitsoftware.com/support/security-bulletins.php - Vendor Advisory |
Information
Published : 2018-12-24 18:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20248
Mitre link : CVE-2018-20248
CVE.ORG link : CVE-2018-20248
JSON object : View
Products Affected
foxitsoftware
- quick_pdf_library