First published: Fri May 03 2024(Updated: )
Kofax Power PDF OXPS File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OXPS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21990.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nuance Power PDF Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51568 has a moderate severity rating as it allows for information disclosure.
CVE-2023-51568 exploits a use-after-free bug in OXPS file parsing, potentially allowing attackers to disclose sensitive information.
CVE-2023-51568 affects certain installations of Kofax Power PDF, but specific versions are not detailed in the vulnerability description.
To mitigate CVE-2023-51568, ensure that Kofax Power PDF is updated to the latest version provided by the vendor.
Yes, user interaction is required to exploit CVE-2023-51568 as the attacker must convince the user to open a specially crafted OXPS file.