Description
Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted GIF in a PDF file.
Exploits (1)
exploitdb
WRITEUP
by Francis Provencher · textlocalwindows
https://www.exploit-db.com/exploits/36859
References (6)
Core 6
Core References
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/36859/
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1032229
Vendor Advisory x_refsource_confirm
http://www.foxitsoftware.com/support/security_bulletins.php#FRD-27
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/74418
Exploit x_refsource_misc
http://protekresearchlab.com/PRL-2015-05/
Scores
EPSS
0.0675
EPSS Percentile
91.3%
Details
CWE
CWE-119
Status
published
Products (3)
foxitsoftware/enterprise_reader
< 7.1.3.320
foxitsoftware/foxit_reader
< 7.1.3.320
foxitsoftware/phantompdf
< 7.1.3.320
Published
May 01, 2015
Tracked Since
Feb 18, 2026