PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
CVE-2023-42064

7.8HIGH

Key Information:

Vendor
CVE Published:
3 May 2024

Summary

A significant vulnerability has been identified in PDF-XChange Editor related to improper handling of U3D file parsing. This flaw allows remote attackers to exploit the application through specially crafted U3D files, leading to potential arbitrary code execution on affected systems. The vulnerability arises from inadequate validation of user-supplied data, which may cause the software to read beyond the allocated memory, thus compromising the integrity of the application. To exploit this vulnerability, an attacker must entice a victim to open a malicious file or visit a harmful webpage. It is imperative for users to apply necessary security updates to mitigate risks associated with this vulnerability.

Affected Version(s)

PDF-XChange Editor 9.5.368.0

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.