The remote host has been observed running a version of Foxit Reader that is subject to multiple attack vectors.
Description
Versions of Foxit Reader prior to 8.3 are affected by the following vulnerabilities : - An out-of-bounds write flaw exists that is triggered during the parsing of a specially crafted JPEG2000 image. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. - An unspecified NULL pointer dereference flaw exists that may allow a context-dependent attacker to cause a crash. No further details have been provided. - Use-after-free errors exist that are triggered when handling the 'Annotations.arrowEnd()', 'Field.buttonSetCaption()', 'Field.getItemAt()', 'Field.insertItemAt()', 'Field.setAction()', 'Link.saveAs()', 'addAnnot()', 'exportAsFDF()', 'getAnnot()', 'getURL()', 'importAnXFDF()', 'resetForm()', 'response()', 'scroll()', and 'spawnPageFromTemplate()' methods. With a specially crafted PDF file, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code. - Use-after-free errors exist that are triggered when handling the 'Annotations.lock', 'Annotations.style', and 'Annotations.opacity' properties. With a specially crafted PDF file, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code.