SB2023040318 - Multiple vulnerabilities in PDF-XChange Editor
Published: April 3, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2023-27337)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
2) Use-after-free (CVE-ID: CVE-2023-27348)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the parsing of TIF files. A remote attacker can trick a victim to open a specially crafted TIF file and execute arbitrary code on the target system.
3) Out-of-bounds write (CVE-ID: CVE-2023-27345)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
4) Out-of-bounds write (CVE-ID: CVE-2023-27344)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
5) Out-of-bounds write (CVE-ID: CVE-2023-27343)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of EMF files. A remote attacker can create a specially crafted EMF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
6) Untrusted Pointer Dereference (CVE-ID: CVE-2023-27342)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to untrusted pointer dereference within the parsing of EMF files. A remote attacker can trick a victim to open a specially crafted EMF file and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Out-of-bounds write (CVE-ID: CVE-2023-27341)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of TIF files. A remote attacker can create a specially crafted TIF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
8) Out-of-bounds write (CVE-ID: CVE-2023-27340)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of PNG files. A remote attacker can create a specially crafted PNG file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
9) Out-of-bounds write (CVE-ID: CVE-2023-27339)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of PNG files. A remote attacker can create a specially crafted PNG file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
10) Use-after-free (CVE-ID: CVE-2023-27338)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the parsing of TIF files. A remote attacker can trick a victim to open a specially crafted TIF file and gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.
References
- https://www.zerodayinitiative.com/advisories/ZDI-23-349/
- https://www.tracker-software.com/product/pdf-xchange-editor/history
- https://www.zerodayinitiative.com/advisories/ZDI-23-358/
- https://www.zerodayinitiative.com/advisories/ZDI-23-357/
- https://www.zerodayinitiative.com/advisories/ZDI-23-356/
- https://www.zerodayinitiative.com/advisories/ZDI-23-355/
- https://www.zerodayinitiative.com/advisories/ZDI-23-354/
- https://www.zerodayinitiative.com/advisories/ZDI-23-353/
- https://www.zerodayinitiative.com/advisories/ZDI-23-352/
- https://www.zerodayinitiative.com/advisories/ZDI-23-351/
- https://www.zerodayinitiative.com/advisories/ZDI-23-350/