Use-After-Free Vulnerability in Foxit PDF Reader by Foxit Software
CVE-2018-3993
8HIGH
Summary
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, specifically in version 9.2.0.9297. When a specially crafted PDF document is opened, it can trigger the reuse of a previously freed object in memory, which may allow an attacker to execute arbitrary code on the targeted system. To exploit this vulnerability, an attacker must entice the user into opening the malicious PDF file. Additionally, if the browser plugin extension of Foxit PDF Reader is enabled, merely visiting a compromised website can also activate this vulnerability, further increasing the risk to users.
Affected Version(s)
Foxit PDF Reader 9.2.0.9297
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved