An attacker can exploit these issues by enticing an unsuspecting user into viewing a malicious PDF file with an application that uses the vulnerable library.Successful exploits can allow the attacker to trigger memory errors, causing a denial-of-service condition.
Vendor Status:
Vendor as issued an updated vulnerability.