PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-42077
7.8HIGH
Summary
A vulnerability exists within the PDF-XChange Editor that stems from improper validation of user-supplied data during the parsing of Enhanced Metafile (EMF) files. This flaw allows an attacker to carry out a remote code execution attack if a user interacts with a malicious webpage or opens a specially crafted file. By exploiting this vulnerability, attackers could execute arbitrary code in the context of the current process, potentially compromising the security of systems using the affected product. Users are advised to remain vigilant against suspicious files and update their software to the latest versions to mitigate risks.
Affected Version(s)
PDF-XChange Editor 10.0.1.371
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved