CVE-2020-8869
Severity
7.8HIGH
EPSS
2.8%
top 13.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 20
Latest updateMay 24
Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vuln…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-p5rx-rg9m-p222: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3↗2022-05-24
CVEList▶
CVE-2020-8869: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3↗2020-08-19