First published: Thu Jul 19 2018(Updated: )
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=9.1.0.5096 | |
Foxit PhantomPDF | <=9.1.0.5096 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3924 has a high severity rating due to its ability to lead to arbitrary code execution.
To fix CVE-2018-3924, you should update Foxit Reader or Foxit PhantomPDF to a version beyond 9.1.5096.
CVE-2018-3924 affects Foxit Reader and Foxit PhantomPDF on Windows platforms.
Yes, CVE-2018-3924 can be exploited remotely if a user opens a specially crafted PDF document.
The vendor for CVE-2018-3924 is Foxit Software, which develops Foxit Reader and PhantomPDF.