Vulnerability Description
The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foxitsoftware | Phantompdf | <= 8.0.5 |
| Foxitsoftware | Reader | <= 8.0.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93608Third Party AdvisoryVDB Entry
- https://www.foxitsoftware.com/support/security-bulletins.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/93608Third Party AdvisoryVDB Entry
- https://www.foxitsoftware.com/support/security-bulletins.phpPatchVendor Advisory
FAQ
What is CVE-2016-8875?
CVE-2016-8875 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application c...
How severe is CVE-2016-8875?
CVE-2016-8875 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8875?
Check the references section above for vendor advisories and patch information. Affected products include: Foxitsoftware Phantompdf, Foxitsoftware Reader.