CVE-2015-2790
Foxitsoftware Enterprise Reader - Improper Input Validation
Title source: ruleDescription
Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image.
Exploits (2)
References (11)
Core 11
Core References
Exploit x_refsource_misc
http://protekresearchlab.com/prl-2015-01prl-foxit-products-gif-conversion-memory-corruption-vulnerabilities-lzwminimumcodesize/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id/1031878
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73430
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/119303
Various Sources x_refsource_confirm
http://www.foxitsoftware.com/support/security_bulletins.php#FRD-23
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1031877
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/119302
Various Sources x_refsource_confirm
http://www.foxitsoftware.com/support/security_bulletins.php#FRD-24
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36334
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36335
Exploit x_refsource_misc
http://protekresearchlab.com/PRL-2015-02/
Scores
EPSS
0.5221
EPSS Percentile
97.9%
Details
CWE
CWE-20
Status
published
Products (3)
foxitsoftware/enterprise_reader
< 7.0.6.1126
foxitsoftware/foxit_reader
< 7.0.6.1126
foxitsoftware/phantompdf
< 7.0.6.1126
Published
Mar 30, 2015
Tracked Since
Feb 18, 2026