Remote Code Execution Vulnerability in Kofax Power PDF Due to J2K File Parsing Memory Corruption
CVE-2023-51608
7.8HIGH
Summary
A vulnerability has been identified in Kofax Power PDF pertaining to memory corruption during the parsing of J2K files. The flaw arises from inadequate validation of input data supplied by the user, creating a condition that may be exploited by malicious actors. To exploit the vulnerability, an attacker must entice a user into visiting a malicious webpage or opening a compromised file, which could lead to arbitrary code execution in the context of the running process. This issue highlights critical security considerations for users of Kofax Power PDF and emphasizes the importance of vigilance against untrusted sources.
Affected Version(s)
Power PDF 5.0.0.57 (5.0.0.10.0.23307)
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published