Remote Code Execution Vulnerability in Foxit PDF Editor
CVE-2021-34965

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
7 May 2024

Summary

A use-after-free vulnerability in Foxit PDF Editor allows remote attackers to execute arbitrary code by exploiting the handling of Annotation objects. The vulnerability occurs when user interaction is involved, requiring the user to visit a specially crafted webpage or open a malicious PDF file. The flaw stems from inadequate validation of object existence before executing operations on it, granting attackers the ability to execute arbitrary code within the context of the running process. This issue emphasizes the need for users to remain vigilant and practice safe browsing habits to mitigate potential risks.

Affected Version(s)

PDF Editor 11.0.0.49893

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.