Use-After-Free Vulnerability in Foxit PDF Reader by Foxit Software
CVE-2018-3993

8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
3 October 2018

Summary

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, specifically in version 9.2.0.9297. When a specially crafted PDF document is opened, it can trigger the reuse of a previously freed object in memory, which may allow an attacker to execute arbitrary code on the targeted system. To exploit this vulnerability, an attacker must entice the user into opening the malicious PDF file. Additionally, if the browser plugin extension of Foxit PDF Reader is enabled, merely visiting a compromised website can also activate this vulnerability, further increasing the risk to users.

Affected Version(s)

Foxit PDF Reader 9.2.0.9297

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.