SB2022081920 - Multiple vulnerabilities in PDF-XChange Editor



SB2022081920 - Multiple vulnerabilities in PDF-XChange Editor

Published: August 19, 2022

Security Bulletin ID SB2022081920
Severity
High
Patch available
YES
Number of vulnerabilities 27
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 27 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2022-37375)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of JPC files. A remote attacker can create a specially crafted JPC file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


2) Out-of-bounds write (CVE-ID: CVE-2022-37349)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the submitForm method. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


3) Out-of-bounds write (CVE-ID: CVE-2022-37350)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the handling of Collab objects. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


4) Out-of-bounds read (CVE-ID: CVE-2022-37351)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of J2K files. A remote attacker can create a specially crafted J2K file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


5) Out-of-bounds read (CVE-ID: CVE-2022-37352)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of WMF files. A remote attacker can create a specially crafted WMF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


6) Out-of-bounds read (CVE-ID: CVE-2022-37353)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of EMF files. A remote attacker can create a specially crafted EMF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


7) Out-of-bounds write (CVE-ID: CVE-2022-37354)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of J2K files. A remote attacker can create a specially crafted J2K file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


8) Out-of-bounds write (CVE-ID: CVE-2022-37355)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of JPG files. A remote attacker can create a specially crafted JPG file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


9) Out-of-bounds write (CVE-ID: CVE-2022-37356)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of JPG files. A remote attacker can create a specially crafted JPG file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


10) Out-of-bounds write (CVE-ID: CVE-2022-37357)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of ICO files. A remote attacker can create a specially crafted ICO file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


11) Out-of-bounds read (CVE-ID: CVE-2022-37360)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of EMF files. A remote attacker can create a specially crafted EMF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


12) Use-after-free (CVE-ID: CVE-2022-37359)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the parsing of J2K files. A remote attacker can trick a victim to open a specially crafted J2K file and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


13) Out-of-bounds write (CVE-ID: CVE-2022-37358)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of JPG files. A remote attacker can create a specially crafted JPG file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


14) Out-of-bounds read (CVE-ID: CVE-2022-37361)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of JP2 files. A remote attacker can create a specially crafted JP2 file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


15) Out-of-bounds write (CVE-ID: CVE-2022-37362)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of PNG files. A remote attacker can create a specially crafted PNG file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


16) Out-of-bounds write (CVE-ID: CVE-2022-37363)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of EMF files. A remote attacker can create a specially crafted EMF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


17) Out-of-bounds write (CVE-ID: CVE-2022-37364)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of EMF files. A remote attacker can create a specially crafted EMF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


18) Exposed dangerous method or function (CVE-ID: CVE-2022-37365)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the affected application exposes a JavaScript interface within the saveAs method. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


19) Out-of-bounds write (CVE-ID: CVE-2022-37366)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the handling of Doc objects. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


20) Out-of-bounds write (CVE-ID: CVE-2022-37367)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the handling of AcroForms. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


21) Out-of-bounds read (CVE-ID: CVE-2022-37368)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the handling of Doc objects. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


22) Out-of-bounds write (CVE-ID: CVE-2022-37369)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


23) Out-of-bounds read (CVE-ID: CVE-2022-37370)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


24) Out-of-bounds write (CVE-ID: CVE-2022-37371)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


25) Out-of-bounds write (CVE-ID: CVE-2022-37372)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


26) Out-of-bounds read (CVE-ID: CVE-2022-37373)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


27) Use-after-free (CVE-ID: CVE-2022-37374)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the parsing of PNG files. A remote attacker can trick a victim to open a specially crafted PNG file and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.

References