Use-After-Free Vulnerability in PDF-XChange Editor
CVE-2024-8816
5.5MEDIUM
Summary
A use-after-free vulnerability in the PDF-XChange Editor's U3D file parsing allows remote attackers to disclose sensitive information on vulnerable installations. This security flaw arises from insufficient validation of object existence before performing operations, leading to potential information exploitation. Typically, an attacker must trick users into visiting a malicious webpage or opening a compromised file to leverage this vulnerability, potentially paving the way for arbitrary code execution in the context of the current process.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published