Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2018-3946
8HIGH
Summary
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, specifically in version 9.1.0.5096. This issue arises when a specially crafted PDF document can cause the reuse of an object that has been previously freed in memory. Successful exploitation requires the user's interaction to open the malicious PDF file. Additionally, if the browser plugin extension is enabled, simply visiting a malicious website could also exploit this vulnerability, posing a significant risk to unsuspecting users.
Affected Version(s)
Foxit PDF Reader 9.1.0.5096
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved