First published: Wed Oct 02 2024(Updated: )
A use-after-free vulnerability exists in the way Foxit Reade 2024.1.0.23997 handles a checkbox field object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | =2024.1.0.23997 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28888 is considered a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-28888, update Foxit Reader to the latest version available from the official website.
CVE-2024-28888 is caused by a use-after-free vulnerability in how Foxit Reader handles checkbox field objects.
Users of Foxit Reader version 2024.1.0.23997 are affected by CVE-2024-28888.
An attacker exploiting CVE-2024-28888 can lead to memory corruption, which may result in executing arbitrary code on the victim's machine.