Use-After-Free Vulnerability in Foxit PDF Reader by Foxit Software
CVE-2018-3967
8HIGH
Summary
A use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader version 9.1.0.5096. This issue arises when a specially crafted PDF document causes a previously freed object in memory to be reused, leading to the potential for arbitrary code execution. An attacker can exploit this vulnerability by tricking a user into opening a malicious PDF file or by leveraging a browser plugin extension that activates when visiting a compromised website.
Affected Version(s)
Foxit PDF Reader 9.1.0.5096
References
EPSS Score
19% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved