Use-after-free in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF) - #VU7306
Published: July 4, 2017
Vulnerability identifier: #VU7306
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-416
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Foxit Software Inc.
Affected software:
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
The vulnerability exists due to use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
Remediation
Update to version 8.3.1.