MEDIUM · 5.3

CVE-2016-8875

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application c...

Vulnerability Description

The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."

CVSS Score

5.3

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
FoxitsoftwarePhantompdf<= 8.0.5
FoxitsoftwareReader<= 8.0.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-8875?

CVE-2016-8875 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application c...

How severe is CVE-2016-8875?

CVE-2016-8875 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-8875?

Check the references section above for vendor advisories and patch information. Affected products include: Foxitsoftware Phantompdf, Foxitsoftware Reader.