CVE-2025-6660
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-25

Last updated on: 2025-07-07

Assigner: Zero Day Initiative

Description
PDF-XChange Editor GIF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26763.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-25
Last Modified
2025-07-07
Generated
2026-05-07
AI Q&A
2025-06-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
pdf-xchange pdf-tools 10.5.2.395
pdf-xchange pdf-xchange_editor 10.5.2.395
pdf-xchange pdf-xchange_pro 10.5.2.395
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a heap-based buffer overflow in the GIF file parsing component of PDF-XChange Editor. It occurs because the software does not properly validate the length of user-supplied data before copying it into a fixed-length buffer on the heap. Exploiting this flaw requires user interaction, such as opening a malicious file or visiting a malicious webpage, and allows remote attackers to execute arbitrary code within the context of the affected process.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on your system with the privileges of the PDF-XChange Editor process. This could lead to unauthorized actions such as installing malware, stealing data, or taking control of the affected system. Exploitation requires user interaction, like opening a malicious file or visiting a malicious webpage.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart