跳转到帖子

Foxit Reader: AcroForm Use-After-Free Remote Code Execution Vulnerability (CVE-2024-9250)

recommended_posts

发布于
  • Members

Foxit Reader: AcroForm Use-After-Free Remote Code Execution Vulnerability (CVE-2024-9250)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
11/22/2024
Created
12/11/2024
Added
12/10/2024
Modified
01/28/2025

Description

Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24489.

Solution(s)

  • foxit-reader-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-9250
  • CVE - 2024-9250
  • https://www.foxit.com/support/security-bulletins.html
  • https://www.zerodayinitiative.com/advisories/ZDI-24-1303/
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…