Remote Code Execution Vulnerability in Foxit PhantomPDF by Foxit Software
CVE-2021-27271

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
30 March 2021

Summary

This vulnerability allows remote attackers to execute arbitrary code on installations of Foxit PhantomPDF 10.1.0.37527 if the user inadvertently visits a malicious webpage or opens a malicious PDF file. The flaw is rooted in improper validation of U3D objects embedded within PDF documents, leading to an out-of-bounds read condition. Successfully exploiting this vulnerability enables an attacker to execute code in the context of the affected process, posing a significant risk to user data and system integrity.

Affected Version(s)

PhantomPDF 10.1.0.37527

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mat Powell of Trend Micro Zero Day Initiative
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.