CVE-2018-20248
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.
En Foxit Quick PDF Library (todas las versiones anteriores a la 16.12), hay un problema al cargar un PDF mal formado o malicioso que contiene punteros o datos de tabla xref inválidos. El uso de las funciones LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile o DAOpenFileReadOnly podría resultar en una violación de acceso provocada por un acceso a la memoria fuera de límites.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-19 CVE Reserved
- 2018-12-24 CVE Published
- 2024-05-16 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-787: Out-of-bounds Write
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106306 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.foxitsoftware.com/support/security-bulletins.php | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Foxitsoftware Search vendor "Foxitsoftware" | Quick Pdf Library Search vendor "Foxitsoftware" for product "Quick Pdf Library" | < 16.12 Search vendor "Foxitsoftware" for product "Quick Pdf Library" and version " < 16.12" | - |
Affected
|