cve/2023/CVE-2023-33866.md
2024-06-18 02:51:15 +02:00

18 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-33866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33866)
![](https://img.shields.io/static/v1?label=Product&message=Foxit%20Reader&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2012.1.2.15332%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%3A%20Use%20After%20Free&color=brighgreen)
### Description
A use-after-free vulnerability exists in the JavaScript engine of Foxit Softwares PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757
#### Github
No PoCs found on GitHub currently.