This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNumWords method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6058.
| Software | From | Fixed in |
|---|---|---|
| foxitsoftware / foxit_reader | - | 9.1.0.5096.x |
| foxitsoftware / phantompdf | - | 9.1.0.5096.x |