Remote Code Execution Vulnerability in Foxit PDF Editor
CVE-2021-34959

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
7 May 2024

Summary

A vulnerability in Foxit PDF Editor involves a use-after-free condition in the handling of Annotation objects. This flaw allows attackers to execute arbitrary code on the system if a user interacts with a malicious PDF file or navigates to a harmful webpage. The root cause stems from the failure to validate the existence of an Annotation object before executing operations, potentially leading to full compromise of the affected system. Users are advised to exercise caution when opening PDF files from unknown sources to mitigate the risk associated with this vulnerability. For further information, refer to the advisory provided by ZDI.

Affected Version(s)

PDF Editor 11.0.0.49893

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.