PDF-XChange Editor PDF File Parsing Memory Corruption Remote Code Execution Vulnerability
CVE-2023-42043
7.8HIGH
Summary
A vulnerability has been identified within PDF-XChange Editor that involves a flaw in the parsing of PDF files. This flaw is associated with improper validation of user-supplied data, leading to potential memory corruption. As a result, remote attackers can exploit this vulnerability by enticing users to open malicious PDF files or visit harmful webpages, thereby executing arbitrary code in the context of the affected application. Users should be cautious when opening PDF files from untrusted sources to mitigate the risks associated with this vulnerability.
Affected Version(s)
PDF-XChange Editor 9.5.368.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved