Use-After-Free Vulnerability in Foxit PDF Reader Software
CVE-2018-3943

8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
2 October 2018

Summary

A use-after-free vulnerability in the Foxit PDF Reader JavaScript engine can be exploited through specially crafted PDF documents. This vulnerability allows an attacker to execute arbitrary code by triggering a previously freed memory object. Users may inadvertently activate the exploit by opening a compromised PDF file. Additionally, if the browser plugin is enabled, simply visiting a malicious website can also invoke the vulnerability, posing a significant risk to users.

Affected Version(s)

Foxit PDF Reader Foxit Software PDF Reader 9.1.0.5096.

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.