Foxit PhantomPDF < 7.2 Multiple Vulnerabilities
High Nessus Plugin ID 86697
SynopsisA PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities.
DescriptionAccording to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is affected by multiple vulnerabilities :
- A memory overflow condition exists in the PDF creator plugin (ConvertToPDF_x86.dll) when converting a PNG file to a PDF file due to an error that occurs when copying a memory block. An attacker can exploit this to execute arbitrary code. (BID 76130)
- A memory corruption issue exists when opening certain XFA forms. An attacker can exploit this to generate files that crash the application. (BID 76132)
- A heap corruption issue exists when processing malformed color table data in a GIF file. An unauthenticated, remote attacker can exploit this by using a crafted GIF file to execute arbitrary code. (VulnDB 126400)
- A flaw exists when converting a TIFF file to a PDF file due to reading a VTABLE from an invalid location. An unauthenticated, remote attacker can exploit this by using a crafted TIFF image to execute arbitrary code.
SolutionUpgrade to Foxit PhantomPDF version 7.2.0722 or later.