First published: Wed Dec 18 2024(Updated: )
A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47810 has been classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-47810, you should update Foxit Reader to the latest version available from the official website.
CVE-2024-47810 is a use-after-free vulnerability related to the handling of 3D page objects in Foxit Reader.
Exploitation of CVE-2024-47810 can lead to memory corruption and allow attackers to execute arbitrary code on the affected system.
CVE-2024-47810 affects users of Foxit Reader version 2024.3.0.26795 and possibly other versions.