Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-8875

Опубликовано: 31 окт. 2016
Источник: nvd
CVSS3: 5.3
CVSS2: 4.3
EPSS Низкий

Описание

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:windows:*:*
Версия до 8.0.5 (включая)
cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:windows:*:*
Версия до 8.0.5 (включая)

EPSS

Процентиль: 26%
0.00088
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 5.3
github
около 3 лет назад

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

EPSS

Процентиль: 26%
0.00088
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-125