CVE-2022-27359
https://notcve.org/view.php?id=CVE-2022-27359
Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow a this.maildoc NULL pointer dereference. Foxit PDF Reader antes de la versión 12.0.1 y PDF Editor antes de la versión 12.0.1 permiten una desviación del puntero NULL de this.maildoc • https://drive.google.com/file/d/1INiwZyuuWHWfVOBFnVTf5kC7smynSyOy/view?usp=sharing https://www.foxitsoftware.com/support/security-bulletins.php • CWE-476: NULL Pointer Dereference •
CVE-2022-25108
https://notcve.org/view.php?id=CVE-2022-25108
Foxit PDF Reader and Editor before 11.2.1 and PhantomPDF before 10.1.7 allow a NULL pointer dereference during PDF parsing because the pointer is used without proper validation. Foxit PDF Reader and Editor versiones anteriores a 11.2.1 y PhantomPDF versiones anteriores a 10.1.7, permiten una desreferencia de puntero NULL durante el análisis de PDF porque el puntero se usa sin la comprobación apropiada • https://www.foxit.com/support/security-bulletins.html • CWE-476: NULL Pointer Dereference •
CVE-2022-24907 – Foxit PDF Reader JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-24907
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxit.com/support/security-bulletins.html https://www.zerodayinitiative.com/advisories/ZDI-22-350 • CWE-125: Out-of-bounds Read •
CVE-2022-24908 – Foxit PDF Reader JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-24908
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 image can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxit.com/support/security-bulletins.html https://www.zerodayinitiative.com/advisories/ZDI-22-351 • CWE-125: Out-of-bounds Read •
CVE-2022-24954
https://notcve.org/view.php?id=CVE-2022-24954
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have a Stack-Based Buffer Overflow related to XFA, for the 'subform colSpan="-2"' and 'draw colSpan="1"' substrings. Foxit PDF Reader versiones anteriores a 11.2.1 y Foxit PDF Editor versiones anteriores a 11.2.1, presentan un desbordamiento de búfer en la región Stack de la memoria relacionado con XFA, para las subcadenas "subform colSpan="-2"' y "draw colSpan="1"' • https://twitter.com/l33d0hyun/status/1487047927415459851 https://www.foxit.com/support/security-bulletins.html • CWE-787: Out-of-bounds Write •