Use-After-Free Vulnerability in Foxit PDF Reader Software
CVE-2023-33866

8.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
19 July 2023

Summary

A use-after-free vulnerability in the JavaScript engine of Foxit PDF Reader allows for potential arbitrary code execution. The flaw is triggered when objects associated with PDF pages are prematurely deleted, enabling a specially crafted PDF document to reuse memory that has already been freed. This can occur when a user is deceived into opening a malicious PDF file or visiting a compromised website while the browser plugin extension for Foxit is enabled. Ensuring software is up-to-date and exercising caution with unsolicited documents are crucial steps to mitigate the risk.

Affected Version(s)

Foxit Reader 12.1.2.15332

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Kamlapati Choubey and Aleksandar Nikolic of Cisco Talos.
.