Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2018-3995
8HIGH
Summary
A use-after-free vulnerability in the JavaScript engine of Foxit Software's PDF Reader allows attackers to execute arbitrary code via a maliciously crafted PDF document. When a user opens this harmful file, it can lead to exploitation of previously freed memory, potentially allowing unauthorized actions. Additionally, if the browser plugin extension is active, merely visiting a compromised website may also trigger this vulnerability, heightening the risk for unsuspecting users.
Affected Version(s)
Foxit PDF Reader 9.2.0.9297
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved