Foxit.Reader.JavaScript.getPageNumWords.Use.After.Free

description-logoDescription

This indicates an attack attempt to exploit a Use After Free vulnerability in Foxit Reader.
A remote attacker can exploit this vulnerability by enticing a user to open a crafted PDF document. Successful exploitation can allow the attacker to execute arbitrary code in the context of the application.

affected-products-logoAffected Products

Foxit Software Foxit Reader 9.2.0.9297 and earlier
Foxit Software PhantomPDF 8.3.7.38093 and earlier

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor supplied advisory for updates:
https://www.foxitsoftware.com/support/security-bulletins.php

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-14 14.633 Default_action:pass:drop
2019-03-12 14.571