Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-22hq-4pp4-cw6m

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

EPSS

Процентиль: 26%
0.00088
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 5.3
nvd
больше 8 лет назад

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

EPSS

Процентиль: 26%
0.00088
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-125