Use-after-free Vulnerability in Foxit PDF Reader by Foxit Software
CVE-2018-3992

8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
8 October 2018

Summary

A use-after-free vulnerability found in the JavaScript engine of Foxit Software's Foxit PDF Reader allows a specially crafted PDF document to exploit memory management flaws. When a previously freed object is accessed again, it can lead to arbitrary code execution. Attackers can trigger this vulnerability by convincing users to open a maliciously crafted PDF file. Additionally, if the browser plugin extension is active, simply visiting a compromised website could also exploit this vulnerability.

Affected Version(s)

Foxit PDF Reader 9.2.0.9297

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.