CVE-2011-0332
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
25/02/2011
Last modified:
11/04/2025
Description
Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:* | 4.3 (including) | |
| cpe:2.3:a:foxitsoftware:foxit_reader:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_reader:4.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:foxitsoftware:foxit_phantom:*:*:*:*:*:*:*:* | 2.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/43329
- http://secunia.com/advisories/43440
- http://secunia.com/secunia_research/2011-14/
- http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory
- http://www.securitytracker.com/id?1025129=
- http://www.vupen.com/english/advisories/2011/0508
- http://secunia.com/advisories/43329
- http://secunia.com/advisories/43440
- http://secunia.com/secunia_research/2011-14/
- http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory
- http://www.securitytracker.com/id?1025129=
- http://www.vupen.com/english/advisories/2011/0508



