Vulnerabilites related to Foxit - Foxit ActiveX Pro SDK
CVE-2018-14311 (GCVE-0-2018-14311)
Vulnerability from cvelistv5
Published
2018-07-31 20:00
Modified
2024-08-05 09:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - -Access of Resource Using Incompatible Type ('Type Confusion')
Summary
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA events. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6331.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Foxit | Foxit ActiveX Pro SDK |
Version: 9.1.0.5096 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:21:41.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-771" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Foxit ActiveX Pro SDK", "vendor": "Foxit", "versions": [ { "status": "affected", "version": "9.1.0.5096" } ] } ], "datePublic": "2018-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA events. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6331." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843-Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-31T19:57:01", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "tags": [ "x_refsource_MISC" ], "url": "https://zerodayinitiative.com/advisories/ZDI-18-771" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2018-14311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Foxit ActiveX Pro SDK", "version": { "version_data": [ { "version_value": "9.1.0.5096" } ] } } ] }, "vendor_name": "Foxit" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA events. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6331." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-843-Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.foxitsoftware.com/support/security-bulletins.php", "refsource": "CONFIRM", "url": "https://www.foxitsoftware.com/support/security-bulletins.php" }, { "name": "https://zerodayinitiative.com/advisories/ZDI-18-771", "refsource": "MISC", "url": "https://zerodayinitiative.com/advisories/ZDI-18-771" } ] } } } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2018-14311", "datePublished": "2018-07-31T20:00:00", "dateReserved": "2018-07-16T00:00:00", "dateUpdated": "2024-08-05T09:21:41.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }