漏洞标题
N/A
漏洞描述信息
这个漏洞允许远程攻击者揭示 Foxit PhantomPDF 10.1.0.37527 受影响的安装信息中的敏感信息。要利用这个漏洞,目标必须访问恶意页面或打开恶意文件。该特定漏洞存在于 PDF 文件中嵌入的 U3D 对象的处理中。问题源于对用户输入数据的错误验证,这可能导致读取到分配给对象的最后一个字节。攻击者可以利用这个漏洞与其他漏洞相结合,在当前进程上下文中执行任意代码。
ZDI-CAN-12290。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290.
CVSS信息
N/A
漏洞类别
跨界内存读
漏洞标题
Foxit PhantomPDF 缓冲区错误漏洞
漏洞描述信息
Foxit PhantomPDF是中国福昕(Foxit)公司的一款PDF文档阅读器。 Foxit PhantomPDF 存在缓冲区错误漏洞,该漏洞允许远程攻击者披露敏感信息。
CVSS信息
N/A
漏洞类别
缓冲区错误