Use-After-Free Vulnerability in PDF-XChange Editor Affecting U3D File Parsing
CVE-2024-8818
7.8HIGH
Summary
A use-after-free vulnerability exists in PDF-XChange Editor that affects the parsing of U3D files. This flaw emerges from insufficient validation of object existence before performing operations on it. As a result, attackers may exploit this condition to execute arbitrary code within the context of the current process. User interaction is necessary for exploitation, as victims must either open a malicious file or visit a compromised webpage featuring the malicious content. This vulnerability highlights significant security risks associated with improper file handling in widely used software.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published