First published: Thu May 24 2018(Updated: )
An issue was discovered in Foxit Reader before 9.1 and PhantomPDF before 9.1. This vulnerability allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when rendering U3D images inside of pdf files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this to execute code in the context of the current process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PhantomPDF | <=9.0.1.1049 | |
Foxit Reader for Windows | <=9.0.1.1049 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7407 is classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2018-7407, users should update Foxit Reader and PhantomPDF to version 9.1 or later.
CVE-2018-7407 can be exploited through malicious web pages or files that require user interaction.
CVE-2018-7407 affects users of Foxit Reader and PhantomPDF versions prior to 9.1.
Exploitation of CVE-2018-7407 can lead to unauthorized remote code execution, potentially compromising the user's system.