A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.
References
| Link | Resource |
|---|---|
| https://www.foxit.com/support/security-bulletins.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
23 Dec 2025, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.foxit.com/support/security-bulletins.html - Vendor Advisory | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
|
| First Time |
Foxit
Microsoft windows Microsoft Foxit pdf Reader Apple macos Apple Foxit pdf Editor |
19 Dec 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-19 07:16
Updated : 2025-12-23 17:37
NVD link : CVE-2025-66499
Mitre link : CVE-2025-66499
CVE.ORG link : CVE-2025-66499
JSON object : View
Products Affected
microsoft
- windows
foxit
- pdf_editor
- pdf_reader
apple
- macos
CWE
CWE-190
Integer Overflow or Wraparound
