CVE-2021-40420Use After Free in Foxit Reader

CWE-416Use After Free5 documents4 sources
Severity
8.8HIGHNVD
EPSS
0.6%
top 30.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4
Latest updateFeb 10

Description

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfoxit/pdf_reader11.1.0.52543
CVEListV5foxitsoftware/foxit_readerFoxit Reader 11.1.0.52543

🔴Vulnerability Details

2
GHSA
GHSA-fp63-vpqm-jj5g: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112022-02-10
CVEList
CVE-2021-40420: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112022-02-04

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader2022-01-31
Talos
Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader2022-01-31
CVE-2021-40420 — Use After Free in Foxit Reader | cvebase