PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2024-7352

7.8HIGH

Key Information:

Vendor
CVE Published:
22 November 2024

Summary

A critical flaw has been identified in the PDF file parsing functionality of PDF-XChange Editor by Tracker Software. This vulnerability stems from inadequate validation of user-supplied data during the parsing process, resulting in an out-of-bounds write. Attackers can exploit this weakness to execute arbitrary code within the context of the affected system. Successful exploitation necessitates user interaction, as the user must either access a malicious web page or open a compromised PDF file. Organizations using PDF-XChange Editor should prioritize applying the latest security patches to mitigate potential risks.

Affected Version(s)

PDF-XChange Editor 10.2.1.385

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.