Use-After-Free Vulnerability in PDF-XChange Editor Affecting Sensitive Data
CVE-2024-8821
5.5MEDIUM
Summary
A vulnerability in PDF-XChange Editor permits remote attackers to exploit flaws in the parsing of U3D files, leading to the potential disclosure of sensitive information on impacted installations. The issue arises from the program's failure to validate the existence of an object before performing operations on it. This weakness necessitates user interaction, as an attacker must entice the target to either visit a malicious web page or open a specially crafted file. This vulnerability can be chained with other threats to execute arbitrary code in the context of the current user's session, resulting in significant security risks.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published