Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability
CVE-2023-38117

7.8HIGH

Key Information:

Vendor

Foxit

Vendor
CVE Published:
3 May 2024

What is CVE-2023-38117?

The vulnerability in Foxit PDF Reader revolves around the improper handling of Doc objects, which leads to a use-after-free condition that can be exploited by remote attackers. When users interact with malicious files or web pages, the flaw allows attackers to execute arbitrary code within the context of the affected PDF Reader installation. This exploit stems from insufficient validation of object existence before performing operations, highlighting a critical concern for users of the PDF software. Users are urged to remain cautious while opening any unknown or suspicious documents to mitigate the risk. For further information, refer to the vendor's security bulletin and the advisory from the Zero Day Initiative.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

PDF Reader 12.1.2.15332

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.