CVE-2021-21893Use After Free in Foxit Reader

CWE-416Use After Free6 documents5 sources
Severity
8.8HIGHNVD
EPSS
1.0%
top 22.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5
Latest updateMay 24

Description

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.0.0.49893. A specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfoxit/pdf_reader11.0.0.49893
CVEListV5foxitsoftware/foxit_readerFoxit Reader 11.0.0.49893

🔴Vulnerability Details

2
GHSA
GHSA-cjvq-xvv5-f922: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112022-05-24
CVEList
CVE-2021-21893: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112021-08-05

🕵️Threat Intelligence

3
Talos
Vulnerability Spotlight: Use-after-free vulnerabilities in Foxit PDF Reader2021-07-27
Talos
Vulnerability Spotlight: Use-after-free vulnerabilities in Foxit PDF Reader2021-07-27
Threat Intel
UNC5330
CVE-2021-21893 — Use After Free in Foxit Reader | cvebase