Use-After-Free Vulnerability in Foxit Software's PDF Reader
CVE-2023-27379
8.8HIGH
Summary
A use-after-free vulnerability has been identified in Foxit Software's PDF Reader, specifically in version 12.1.2.15332. This flaw arises when objects linked to pages within the JavaScript engine are prematurely deleted. By leveraging a specially crafted PDF document, an attacker may exploit this vulnerability to trigger the reuse of previously freed memory. The exploitation can be initiated if a user is deceived into opening the malicious PDF file. Additionally, the risk is heightened if the vulnerable browser plugin extension is enabled and the user inadvertently visits a specially crafted, malicious website.
Affected Version(s)
Foxit Reader 12.1.2.15332
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Discovered by Aleksandar Nikolic and Kamlapati Choubey of Cisco Talos.