Remote Code Execution Vulnerability in Foxit PDF Editor
CVE-2021-34966

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
7 May 2024

Summary

The vulnerability pertains to Foxit PDF Editor and arises from a flaw in the handling of Annotation objects, specifically a use-after-free condition. When an Annotation object is not properly validated before operations are performed, it opens the door for attackers to exploit the application. This exploitation can occur upon the user opening a specially crafted PDF file or interacting with a compromised webpage, resulting in the execution of arbitrary code within the context of the running application. This vulnerability highlights the importance of robust validation practices to ensure software security.

Affected Version(s)

PDF Editor 11.0.0.49893

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.