Use-After-Free Vulnerability in Foxit Software PDF Reader
CVE-2018-3944
8HIGH
Summary
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, specifically in version 9.1.0.5096. This vulnerability allows an attacker to exploit a specially crafted PDF document that can cause a previously freed object in memory to be reused. Successful exploitation can result in arbitrary code execution. To trigger this vulnerability, users need to be convinced to open the malicious PDF file. Additionally, if the browser plugin extension is enabled, merely visiting a compromised website may also exploit this vulnerability.
Affected Version(s)
Foxit PDF Reader Foxit Software Foxit PDF Reader 9.1.0.5096.
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved