Use After Free Vulnerability in Foxit Reader SDK ActiveX
CVE-2018-19444
7.8HIGH
Summary
A use after free vulnerability exists in the Validate action of the TextBox field within the IReader_ContentProvider component of Foxit Reader SDK (ActiveX) Professional 5.4.0.1031. It can be triggered when specially crafted PDF files are processed. An attacker could exploit this flaw to execute arbitrary code remotely, leading to significant security risks for affected systems. This vulnerability is distinct from CVE-2018-19452, showcasing different memory handling issues and requiring unique JavaScript payloads for successful exploitation.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved