Foxit PhantomPDF < 8.3.9 Multiple Vulnerabilities
Medium Nessus Plugin ID 121246
SynopsisA PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities.
DescriptionAccording to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 8.3.9. It is, therefore, affected by following vulnerabilities:
- An out-of-bounds read/write vulnerability exists when handling certain XFA element attributes.
This occurs due to improper calculation of a null-terminated character and may cause an application crash.
- A signature validation bypass vulnerability exists which provides incorrect results when validating certain PDF documents.
- Flaws in how PDF files are processed/handled could lead to arbitrary code execution. An attacker can exploit this by convincing a user to open a specially crafted file in order to cause the execution of arbitrary code. (CVE-2019-6728,CVE-2019-6729)
Additionally, the application was affected by multiple potential information disclosure, denial of service, and remote code execution vulnerabilities.
SolutionUpgrade to Foxit PhantomPDF version 8.3.9 or later.