跳转到帖子

Foxit Reader: Use After Free (CVE-2024-7722)

recommended_posts

发布于
  • Members

Foxit Reader: Use After Free (CVE-2024-7722)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
08/21/2024
Created
10/22/2024
Added
10/21/2024
Modified
01/28/2025

Description

Foxit PDF Reader Doc Object Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-23702.

Solution(s)

  • foxit-reader-upgrade-2024_2_3_25184

References

  • https://attackerkb.com/topics/cve-2024-7722
  • CVE - 2024-7722
  • https://www.foxit.com/support/security-bulletins.html
  • https://www.zerodayinitiative.com/advisories/ZDI-24-1124/
  • 查看数 692
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…