Remote Code Execution Vulnerability in Foxit PDF Editor
CVE-2021-34962
7.8HIGH
Summary
This vulnerability in Foxit PDF Editor arises from improper handling of Annotation objects, allowing for a use-after-free condition that can be exploited by remote attackers. To successfully launch an attack, the user must open a specially crafted file or navigate to a malicious web page. The flaw relates to the system's failure to validate the existence of an object prior to executing operations on it, potentially giving attackers the ability to run arbitrary code in the context of the affected application. Proper measures should be implemented to mitigate this risk, including the application of security patches and user education on safe file handling.
Affected Version(s)
PDF Editor 11.0.0.49893
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved