Makers of popular PDF reader Foxit have patched 12 dangerous vulnerabilities that could have resulted in remote code execution.

Some 400 million users run the flagship reader billed as an alternative to Adobe Reader. Thedozen flaws are patched in Windows and Linux variants.

Users would need to be conned into opening a malicious PDF with Foxit Reader or PhantomPDF in order to be compromised using the vulnerabilities.

Seven of the patched holes allowed direct remote code execution while the remainder required chaining with other flaws to achieve the level of compromise.

Foxit listed six of the flaws in an advisory.

Version 8 of Reader and PhantomPDF plug the flaws:

ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

ConvertToPDF BMP Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

ConvertToPDF GIF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

exportData Restrictions Bypass Remote Code Execution Vulnerability

Safe Mode Bypass Information Disclosure Vulnerability

FlateDecode Use-After-Free Remote Code Execution Vulnerability

Pattern Uninitialized Pointer Remote Code Execution Vulnerability

FlateDecode Use-After-Free Remote Code Execution Vulnerability

GoToR action Stack Buffer Overflow Remote Code Execution Vulnerability

®