Lucene search

K
zdiEsteban Ruiz (mr_me) of Source InciteZDI-18-766
HistoryJul 19, 2018 - 12:00 a.m.

Foxit Reader Button buttonSetIcon Use-After-Free Remote Code Execution Vulnerability

2018-07-1900:00:00
Esteban Ruiz (mr_me) of Source Incite
www.zerodayinitiative.com
6

0.022 Low

EPSS

Percentile

89.6%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of button objects. By manipulating a document’s elements, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.

0.022 Low

EPSS

Percentile

89.6%