First published: Sat Nov 17 2018(Updated: )
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read), obtain sensitive information, or possibly have unspecified other impact via a U3D sample because of a "Data from Faulting Address controls Code Flow starting at U3DBrowser!PlugInMain+0x00000000000f43ff" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | =9.3.0.10826 | |
Foxit U3D | =9.3.0.10809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19343 has a medium severity, allowing for denial of service or potential information disclosure.
To mitigate CVE-2018-19343, update Foxit Reader to version 9.3.0.10827 or later.
CVE-2018-19343 can lead to out-of-bounds reads and might disclose sensitive information.
Foxit Reader versions prior to 9.3.0.10827, specifically 9.3.0.10826, are vulnerable to CVE-2018-19343.
Yes, CVE-2018-19343 can be exploited remotely through specially crafted U3D samples.