Remote Code Execution Vulnerability in PDF-XChange Editor Due to U3D File Parsing
CVE-2024-8813
7.8HIGH
Summary
A remote code execution vulnerability exists in the PDF-XChange Editor due to improper validation of user-supplied data during U3D file parsing. This oversight can lead to an out-of-bounds write, allowing attackers to execute arbitrary code in the context of the affected process. Exploitation requires user interaction, as the victim must either visit a specially crafted web page or open a malicious file containing the vulnerable U3D content. Organizations using PDF-XChange Editor should ensure they are on the latest versions to mitigate this risk and secure their systems against potential exploitation.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published