Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2023-2996
Vulnerability from csaf_certbund
Published
2023-11-22 23:00
Modified
2023-12-20 23:00
Summary
Foxit PDF Editor und Foxit Reader: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Foxit PDF Editor ist ein Tool zur Bearbeitung von PDF-Dateien.
Foxit Reader ist ein PDF Reader.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Foxit PDF Editor und Foxit Reader ausnutzen, um beliebigen Programmcode auszuführen und um Informationen offenzulegen.
Betroffene Betriebssysteme
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Foxit PDF Editor ist ein Tool zur Bearbeitung von PDF-Dateien.\r\nFoxit Reader ist ein PDF Reader.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Foxit PDF Editor und Foxit Reader ausnutzen, um beliebigen Programmcode auszuf\u00fchren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2996 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2996.json" }, { "category": "self", "summary": "WID-SEC-2023-2996 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2996" }, { "category": "external", "summary": "Foxit Security bulletins vom 2023-11-22", "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source_lang": "en-US", "title": "Foxit PDF Editor und Foxit Reader: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-12-20T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:20.955+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2996", "initial_release_date": "2023-11-22T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-22T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-12-20T23:00:00.000+00:00", "number": "2", "summary": "CVE\u0027s erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Foxit PDF Editor \u003c 2023.3", "product": { "name": "Foxit PDF Editor \u003c 2023.3", "product_id": "T031340", "product_identification_helper": { "cpe": "cpe:/a:foxitsoftware:pdf_editor:2023.3" } } }, { "category": "product_name", "name": "Foxit Reader \u003c 2023.3", "product": { "name": "Foxit Reader \u003c 2023.3", "product_id": "T031341", "product_identification_helper": { "cpe": "cpe:/a:foxitsoftware:foxit_reader:2023.3" } } } ], "category": "vendor", "name": "Foxit" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-51562", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51562" }, { "cve": "CVE-2023-51561", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51561" }, { "cve": "CVE-2023-51560", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51560" }, { "cve": "CVE-2023-51559", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51559" }, { "cve": "CVE-2023-51558", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51558" }, { "cve": "CVE-2023-51557", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51557" }, { "cve": "CVE-2023-51556", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51556" }, { "cve": "CVE-2023-51555", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51555" }, { "cve": "CVE-2023-51554", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51554" }, { "cve": "CVE-2023-51553", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51553" }, { "cve": "CVE-2023-51552", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51552" }, { "cve": "CVE-2023-51551", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51551" }, { "cve": "CVE-2023-51550", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51550" }, { "cve": "CVE-2023-51549", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-51549" }, { "cve": "CVE-2023-41257", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-41257" }, { "cve": "CVE-2023-40194", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-40194" }, { "cve": "CVE-2023-38573", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-38573" }, { "cve": "CVE-2023-35985", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-35985" }, { "cve": "CVE-2023-32616", "notes": [ { "category": "description", "text": "In Foxit PDF Editor und Foxit Reader f\u00fcr Windows und MacOS existieren mehrere Schwachstellen. Ursache sind verschiedene Fehler in der Speicherverwaltung des Produkts. Ein Angreifer kann dies ausnutzen, um beliebigen Code auszuf\u00fchren und um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-11-22T23:00:00Z", "title": "CVE-2023-32616" } ] }
cve-2023-41257
Vulnerability from cvelistv5
Published
2023-11-27 15:25
Modified
2024-08-02 18:54
Severity ?
EPSS score ?
Summary
A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | Foxit Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Kamlapati Choubey of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T18:00:08.244Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-41257", "datePublished": "2023-11-27T15:25:09.111Z", "dateReserved": "2023-09-01T19:52:13.983Z", "dateUpdated": "2024-08-02T18:54:04.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51560
Vulnerability from cvelistv5
Published
2024-05-03 02:15
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22259.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1874/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51560", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:37:38.769106Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:50.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:32.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1874", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1874/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.173-06:00", "datePublic": "2023-12-20T17:08:09.761-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22259." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:15:00.131Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1874", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1874/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51560", "datePublished": "2024-05-03T02:15:00.131Z", "dateReserved": "2023-12-20T20:38:20.865Z", "dateUpdated": "2024-08-02T22:40:32.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51549
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21867.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1863/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:12.1.3.15356:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51549", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T14:03:19.178151Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:16.146Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:32.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1863", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1863/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.096-06:00", "datePublic": "2023-12-20T17:06:38.256-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21867." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:51.763Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1863", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1863/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51549", "datePublished": "2024-05-03T02:14:51.763Z", "dateReserved": "2023-12-20T20:38:20.863Z", "dateUpdated": "2024-08-02T22:40:32.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51557
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22256.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1870/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51557", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:15:35.663123Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:41.017Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:34.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1870", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1870/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.155-06:00", "datePublic": "2023-12-20T17:07:35.605-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22256." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:57.662Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1870", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1870/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51557", "datePublished": "2024-05-03T02:14:57.662Z", "dateReserved": "2023-12-20T20:38:20.864Z", "dateUpdated": "2024-08-02T22:40:34.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51550
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader combobox Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of combobox fields. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21870.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1864/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51550", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:24:55.324145Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:21:00.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1864", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1864/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.106-06:00", "datePublic": "2023-12-20T17:06:46.229-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader combobox Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of combobox fields. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21870." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:52.511Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1864", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1864/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader combobox Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51550", "datePublished": "2024-05-03T02:14:52.511Z", "dateReserved": "2023-12-20T20:38:20.863Z", "dateUpdated": "2024-08-02T22:40:33.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38573
Vulnerability from cvelistv5
Published
2023-11-27 15:25
Modified
2024-08-02 17:46
Severity ?
EPSS score ?
Summary
A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | Foxit Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:reader:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-38573", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-11T15:21:53.079630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-11T15:23:49.709Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Aleksandar Nikolic and KPC of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T18:00:08.599Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-38573", "datePublished": "2023-11-27T15:25:08.575Z", "dateReserved": "2023-09-08T16:47:44.441Z", "dateUpdated": "2024-08-02T17:46:56.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51562
Vulnerability from cvelistv5
Published
2024-05-03 02:15
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22500.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1875/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51562", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:22:41.166607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:33.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:32.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1875", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1875/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.184-06:00", "datePublic": "2023-12-20T17:08:20.589-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22500." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:15:01.655Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1875", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1875/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51562", "datePublished": "2024-05-03T02:15:01.655Z", "dateReserved": "2023-12-20T20:38:20.865Z", "dateUpdated": "2024-08-02T22:40:32.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51554
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader Signature Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22122.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1866/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51554", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:01:34.433703Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:32.279Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:32.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1866", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1866/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.136-06:00", "datePublic": "2023-12-20T17:07:01.007-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader Signature Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22122." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:55.379Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1866", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1866/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader Signature Use-After-Free Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51554", "datePublished": "2024-05-03T02:14:55.379Z", "dateReserved": "2023-12-20T20:38:20.864Z", "dateUpdated": "2024-08-02T22:40:32.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51551
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22003.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1873/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51551", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:21:44.820652Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:52.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1873", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1873/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.114-06:00", "datePublic": "2023-12-20T17:08:01.346-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22003." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:53.193Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1873", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1873/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51551", "datePublished": "2024-05-03T02:14:53.193Z", "dateReserved": "2023-12-20T20:38:20.863Z", "dateUpdated": "2024-08-02T22:40:33.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51556
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22255.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1869/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51556", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:16:24.386887Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:43.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1869", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1869/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.149-06:00", "datePublic": "2023-12-20T17:07:27.827-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22255." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:56.861Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1869", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1869/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51556", "datePublished": "2024-05-03T02:14:56.861Z", "dateReserved": "2023-12-20T20:38:20.864Z", "dateUpdated": "2024-08-02T22:40:33.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51555
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22254.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1868/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51555", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T18:31:23.352559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:28.565Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1868", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1868/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.142-06:00", "datePublic": "2023-12-20T17:07:15.670-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22254." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:56.163Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1868", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1868/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51555", "datePublished": "2024-05-03T02:14:56.163Z", "dateReserved": "2023-12-20T20:38:20.864Z", "dateUpdated": "2024-08-02T22:40:33.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51559
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader Doc Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22258.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1872/ | x_research-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51559", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:04:58.581596Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:24.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:34.002Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1872", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1872/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.167-06:00", "datePublic": "2023-12-20T17:07:54.878-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader Doc Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22258." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:59.243Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1872", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1872/" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader Doc Out-Of-Bounds Read Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51559", "datePublished": "2024-05-03T02:14:59.243Z", "dateReserved": "2023-12-20T20:38:20.865Z", "dateUpdated": "2024-08-02T22:40:34.002Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40194
Vulnerability from cvelistv5
Published
2023-11-27 15:25
Modified
2024-10-10 20:24
Severity ?
EPSS score ?
Summary
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | Foxit Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40194", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T20:24:22.405463Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T20:24:32.115Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Foxit Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Kamlapati Choubey of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73: External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T18:00:06.062Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-40194", "datePublished": "2023-11-27T15:25:11.538Z", "dateReserved": "2023-08-15T19:59:27.595Z", "dateUpdated": "2024-10-10T20:24:32.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51553
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader Bookmark Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Bookmark objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22110.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1867/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:14:03.242165Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:12.759Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1867", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1867/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.129-06:00", "datePublic": "2023-12-20T17:07:08.298-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader Bookmark Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Bookmark objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22110." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:54.679Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1867", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1867/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader Bookmark Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51553", "datePublished": "2024-05-03T02:14:54.679Z", "dateReserved": "2023-12-20T20:38:20.863Z", "dateUpdated": "2024-08-02T22:40:33.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51558
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Doc Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22257.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1871/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51558", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:06:29.268223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:35.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1871", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1871/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.161-06:00", "datePublic": "2023-12-20T17:07:44.902-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Doc Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22257." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:58.447Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1871", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1871/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Doc Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51558", "datePublished": "2024-05-03T02:14:58.447Z", "dateReserved": "2023-12-20T20:38:20.864Z", "dateUpdated": "2024-08-02T22:40:33.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35985
Vulnerability from cvelistv5
Published
2023-11-27 15:25
Modified
2024-11-21 20:14
Severity ?
EPSS score ?
Summary
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | Foxit Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35985", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T20:14:29.444528Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T20:14:58.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Foxit Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Kamlapati Choubey of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73: External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T18:00:06.987Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-35985", "datePublished": "2023-11-27T15:25:11.052Z", "dateReserved": "2023-08-15T20:00:03.273Z", "dateUpdated": "2024-11-21T20:14:58.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32616
Vulnerability from cvelistv5
Published
2023-11-27 15:25
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | Foxit Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:35.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Kamlapati Choubey of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T18:00:07.752Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-32616", "datePublished": "2023-11-27T15:25:09.602Z", "dateReserved": "2023-09-01T18:01:06.176Z", "dateUpdated": "2024-08-02T15:25:35.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51552
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22007.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1865/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 12.1.3.15356 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "10.1.12.37872", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_editor", "vendor": "foxit", "versions": [ { "lessThanOrEqual": "11.2.7.53812 ", "status": "affected", "version": "11.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51552", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T20:15:07.640203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:20:23.033Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:32.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1865", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1865/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "12.1.3.15356" } ] } ], "dateAssigned": "2023-12-20T14:45:49.122-06:00", "datePublic": "2023-12-20T17:06:53.283-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22007." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:14:53.993Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1865", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1865/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51552", "datePublished": "2024-05-03T02:14:53.993Z", "dateReserved": "2023-12-20T20:38:20.863Z", "dateUpdated": "2024-08-02T22:40:32.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51561
Vulnerability from cvelistv5
Published
2024-05-03 02:15
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22283.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1862/ | x_research-advisory | |
https://www.foxit.com/support/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Foxit | PDF Reader |
Version: 2023.2.0.21408 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:foxit:pdf_reader:2023.2.0.21408:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pdf_reader", "vendor": "foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-51561", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-05T14:49:48.987066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-05T14:53:18.879Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1862", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1862/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PDF Reader", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "2023.2.0.21408" } ] } ], "dateAssigned": "2023-12-20T14:45:49.178-06:00", "datePublic": "2023-12-20T17:06:31.288-06:00", "descriptions": [ { "lang": "en", "value": "Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22283." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:15:00.880Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1862", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1862/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.foxit.com/support/security-bulletins.html" } ], "source": { "lang": "en", "value": "Mat Powell of Trend Micro Zero Day Initiative" }, "title": "Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-51561", "datePublished": "2024-05-03T02:15:00.880Z", "dateReserved": "2023-12-20T20:38:20.865Z", "dateUpdated": "2024-08-02T22:40:33.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.