Heap-based Buffer Overflow Vulnerability in Tungsten Automation Power PDF
CVE-2024-9734

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
22 November 2024

What is CVE-2024-9734?

This vulnerability is related to a heap-based buffer overflow during the parsing of PDF files in Tungsten Automation Power PDF. The flaw arises from insufficient validation of user-provided data length before copying it to a fixed-length buffer. This lack of validation can be exploited by remote attackers to execute arbitrary code on an affected installation. Successful exploitation depends on user interaction, as the target must either open a malicious PDF or visit a compromised webpage. Properly safeguarding against this vulnerability requires ensuring that users are educated about the risks associated with opening untrusted PDF files.

Affected Version(s)

Power PDF 5.0.0.10.0.23307

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.