First published: Sat Nov 17 2018(Updated: )
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address may be used as a return value starting at U3DBrowser!PlugInMain+0x0000000000031a75" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | =9.3.0.10826 | |
Foxit U3D | =9.3.0.10809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19344 has a severity level classified as medium due to its potential to cause denial of service and expose sensitive information.
To fix CVE-2018-19344, update Foxit Reader to version 9.3.0.10827 or later, which includes security patches addressing this vulnerability.
CVE-2018-19344 allows remote attackers to exploit an out-of-bounds read vulnerability or trigger a denial of service.
CVE-2018-19344 affects Foxit Reader version 9.3.0.10826 and earlier versions.
Exploitation of CVE-2018-19344 typically requires user interaction, such as opening a malicious U3D file.