Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE-2024-30342

7.8HIGH

Key Information:

Vendor

Foxit

Vendor
CVE Published:
2 April 2024

What is CVE-2024-30342?

The vulnerability in Foxit PDF Reader revolves around improper handling of Annotation objects, specifically leading to a Use-After-Free condition. This flaw permits remote attackers to execute arbitrary code on affected installations if user interaction occurs, such as visiting a malicious website or opening a compromised file. The vulnerability's root cause is the failure to validate the existence of an object before executing operations on it, permitting exploitation in the context of the current process. For comprehensive security measures, users are encouraged to apply available security patches promptly.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

PDF Reader 2023.3.0.23028

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.