First published: Thu Sep 17 2020(Updated: )
An exploitable vulnerability exists in the cross-reference table repairing functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242. While searching for an object identifier in a malformed document that is missing from the cross-reference table, the application will save a reference to the object’s cross-reference table entry inside a stack variable. If the referenced object identifier is not found, the application may resize the cross-reference table which can change the scope of its entry. Later when the application tries to reference cross-reference entry via the stack variable, the application will access memory belonging to the recently freed table causing a use-after-free condition. A specially crafted document can be delivered by an attacker and loaded by a victim in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gonitro Nitro Pro | =13.13.2.242 | |
Gonitro Nitro Pro | =13.16.2.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-6115 is high.
Gonitro Nitro Pro versions 13.13.2.242 and 13.16.2.300 are affected by CVE-2020-6115.
CVE-2020-6115 allows an attacker to save a reference to a malformed document, leading to a cross-reference table repairing vulnerability in Nitro Pro.
Yes, Nitro Software, Inc. has released a patch to address the vulnerability. Please update to the latest version of Nitro Pro to fix CVE-2020-6115.
More information about CVE-2020-6115 can be found at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068)