Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2018-3995

8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
3 October 2018

Summary

A use-after-free vulnerability in the JavaScript engine of Foxit Software's PDF Reader allows attackers to execute arbitrary code via a maliciously crafted PDF document. When a user opens this harmful file, it can lead to exploitation of previously freed memory, potentially allowing unauthorized actions. Additionally, if the browser plugin extension is active, merely visiting a compromised website may also trigger this vulnerability, heightening the risk for unsuspecting users.

Affected Version(s)

Foxit PDF Reader 9.2.0.9297

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.