Remote Code Execution Vulnerability in Kofax Power PDF Due to J2K File Parsing Memory Corruption
CVE-2023-51608

7.8HIGH

Key Information:

Vendor
Kofax
Status
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability has been identified in Kofax Power PDF pertaining to memory corruption during the parsing of J2K files. The flaw arises from inadequate validation of input data supplied by the user, creating a condition that may be exploited by malicious actors. To exploit the vulnerability, an attacker must entice a user into visiting a malicious webpage or opening a compromised file, which could lead to arbitrary code execution in the context of the running process. This issue highlights critical security considerations for users of Kofax Power PDF and emphasizes the importance of vigilance against untrusted sources.

Affected Version(s)

Power PDF 5.0.0.57 (5.0.0.10.0.23307)

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.