Use-after-free error in 3D Plugin Beta - #VU16807
Published: January 4, 2019
3D Plugin Beta
Detailed vulnerability description
The vulnerability exists due to the use of wild pointer when handing certain PDF file that embeds specifically crafted 3D content. A remote attacker can trick the victim into processing a specially crafted PDF file, trigger use-after-free error or type confusion error and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.