11/4/2022 0 Comments Foxit pdf readerThe vulnerability could also be exploited via a malicious website, provided that the victim has Foxit’s browser plugin enabled, according to a Cisco Talos advisory.įoxit also addressed multiple use-after-free vulnerabilities in the way the applications handle the annotation objects in certain PDF files, “if the same Annotation dictionary is referenced in the page structures for different pages.” Due to the manner in which certain JavaScript code or annotation objects are handled, a maliciously crafted PDF file may lead to the reuse of previously free memory and arbitrary code execution.Īll three flaws are use-after-free vulnerabilities in the JavaScript engine of PDF Reader that an attacker could exploit by tricking the target into opening a malicious PDF file. Three of the vulnerabilities addressed by Foxit were identified by Cisco Talos researchers, all three leading to arbitrary code execution. #Foxit pdf reader softwareFoxit Software this week released security updates for its PDF Reader and PDF Editor applications, to address multiple vulnerabilities, including some leading to remote code execution.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |