Kaspersky ID:
KLA62106
Erkennungsdatum:
11/22/2023
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability can be exploited remotely to execute arbitrary code and obtain sensitive information.
  2. Use after free vulnerability can be exploited remotely to execute arbitrary code.
  3. Code execution vulnerability in Doc object can be exploited remotely to execute arbitrary code.
  4. Type confusion vulnerability can be exploited to cause denial of service and execute arbitrary code.
  5. Use after free vulnerability in AcroForm Doc can be exploited remotely to execute arbitrary code.
  6. Type confusion vulnerability in Annotation can be exploited to cause denial of service.
  7. Out of bounds read vulnerability in Doc can be exploited remotely to obtain sensitive information.
  8. Out of bounds read vulnerability in File Parser can be exploited remotely to obtain sensitive information.
  9. Use after free vulnerability in AcroForm Signature can be exploited remotely to execute arbitrary code.
  10. Out of bounds read vulnerability in combobox can be exploited remotely to obtain sensitive information.
  11. Use after free vulnerability in Signature can be exploited remotely to execute arbitrary code.
  12. Out of bounds read vulnerability in AcroForm Doc can be exploited remotely to obtain sensitive information.
  13. Out of bounds read vulnerability in Bookmark can be exploited remotely to obtain sensitive information.
  14. Out of bounds read vulnerability in AcroForm out-of-bounds can be exploited remotely to obtain sensitive information.
  15. Use after free vulnerability in AcroForm Doc Object can be exploited remotely to execute arbitrary code.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2023-41257
    critical
  • CVE-2023-32616
    critical
  • CVE-2023-35985
    critical
  • CVE-2023-40194
    critical
  • CVE-2023-38573
    critical
  • CVE-2023-51556
    critical
  • CVE-2023-51560
    critical
  • CVE-2023-51555
    warning
  • CVE-2023-51561
    high
  • CVE-2023-51552
    critical
  • CVE-2023-51550
    warning
  • CVE-2023-51554
    warning
  • CVE-2023-51557
    critical
  • CVE-2023-51558
    warning
  • CVE-2023-51553
    warning
  • CVE-2023-51562
    warning
  • CVE-2023-51551
    critical
  • CVE-2023-51549
    critical
  • CVE-2023-51559
    warning

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.