First published: Tue Apr 30 2024(Updated: )
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Reader | =2024.1.0.23997 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25938 is considered a critical severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-25938, users should update to the latest version of Foxit Reader that addresses this vulnerability.
CVE-2024-25938 specifically affects the Foxit Reader version 2024.1.0.23997 on Windows.
CVE-2024-25938 is a use-after-free vulnerability that can lead to memory corruption and arbitrary code execution.
An attacker exploiting CVE-2024-25938 can execute arbitrary code on the victim's system by crafting a malicious PDF containing JavaScript.