CVE-2022-22150Improper Cleanup on Thrown Exception in Foxit Reader

Severity
8.8HIGHNVD
EPSS
0.9%
top 24.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4
Latest updateFeb 11

Description

A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the bro

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfoxit/pdf_reader11.1.0.52543
CVEListV5foxitsoftware/foxit_readerFoxit Reader 11.1.0.52543

🔴Vulnerability Details

2
GHSA
GHSA-hgjw-m9c6-r5g4: A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112022-02-11
CVEList
CVE-2022-22150: A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 112022-02-04

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader2022-01-31
Talos
Vulnerability Spotlight: Memory corruption and use-after-free vulnerabilities in Foxit PDF Reader2022-01-31
CVE-2022-22150 — Improper Cleanup on Thrown Exception | cvebase