First published: Tue Apr 30 2024(Updated: )
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25648 is considered a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-25648, update your Foxit Reader to the latest version that addresses this vulnerability.
CVE-2024-25648 affects Foxit Reader, specifically version 2024.1.0.23997.
A use-after-free vulnerability, such as CVE-2024-25648, occurs when memory that has been freed is accessed again, leading to memory corruption.
Yes, CVE-2024-25648 can be exploited through a maliciously crafted PDF document opened in Foxit Reader.