CVE-2020-12248

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://www.foxitsoftware.com/support/security-bulletins.php - Vendor Advisory () https://www.foxitsoftware.com/support/security-bulletins.php - Vendor Advisory

Information

Published : 2020-09-04 04:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12248

Mitre link : CVE-2020-12248

CVE.ORG link : CVE-2020-12248


JSON object : View

Products Affected

foxitsoftware

  • phantompdf
  • reader

microsoft

  • windows
CWE
CWE-787

Out-of-bounds Write