#VU16807 Use-after-free error in 3D Plugin Beta


Published: 2019-01-04

Vulnerability identifier: #VU16807

Vulnerability risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-843

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
3D Plugin Beta
Web applications / Modules and components for CMS

Vendor: Foxit Software Inc.

Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the use of wild pointer when handing certain PDF file that embeds specifically crafted 3D content. A remote attacker can trick the victim into processing a specially crafted PDF file, trigger use-after-free error or type confusion error and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Update to version 9.4.0.16807.

Vulnerable software versions

3D Plugin Beta: 8.3.8.1122 - 9.3.0.10830


External links
http://www.foxitsoftware.com/support/security-bulletins.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability