First published: Fri Sep 28 2018(Updated: )
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PhantomPDF | <9.3 | |
Foxit Reader for Windows | <9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17611 is classified as critical, allowing remote code execution or denial of service.
To fix CVE-2018-17611, upgrade Foxit PhantomPDF and Reader to version 9.3 or later.
CVE-2018-17611 affects versions of Foxit PhantomPDF and Reader prior to 9.3.
CVE-2018-17611 can lead to arbitrary code execution or deny service due to a use-after-free vulnerability.
Yes, CVE-2018-17611 can be exploited by manipulating properties of Annotation objects within the affected software.