First published: Thu Apr 19 2018(Updated: )
An exploitable type confusion vulnerability exists in the way Foxit PDF Reader version 9.0.1.1049 parses files with associated file annotations. A specially crafted PDF document can lead to an object of invalid type to be dereferenced, which can potentially lead to sensitive memory disclosure, and possibly to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | =9.0.1.1049 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3843 is classified as a high-severity vulnerability due to its potential to lead to sensitive memory disclosure.
To mitigate CVE-2018-3843, users should upgrade to a version of Foxit PDF Reader that is not affected by this vulnerability.
CVE-2018-3843 is a type confusion vulnerability that can occur when parsing specially crafted PDF documents.
CVE-2018-3843 specifically affects Foxit Reader version 9.0.1.1049.
An attacker can exploit CVE-2018-3843 to potentially disclose sensitive information from memory.