Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE-2024-9254

8.8HIGH

Key Information:

Vendor
Foxit
Status
PDF Reader
Vendor
CVE Published:
22 November 2024

Summary

A vulnerability has been identified within Foxit PDF Reader related to the management of Annotation objects. This flaw, which allows for a use-after-free condition, can be exploited by remote attackers to execute arbitrary code on affected systems. To exploit this vulnerability, user interaction is required; victims must either navigate to a malicious webpage or open a specially crafted file. Failure to validate the existence of Annotation objects before performing operations can lead to severe security implications, enabling attackers to execute code within the context of the application, thereby compromising the integrity of the system.

Affected Version(s)

PDF Reader 2024.2.3.25184

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

Collectors

NVD DatabaseMitre Database
.