Kaspersky ID:
KLA62106
Detect Date:
11/22/2023
Updated:
07/04/2024

Description

Multiple vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability can be exploited remotely to execute arbitrary code and obtain sensitive information.
  2. Use after free vulnerability can be exploited remotely to execute arbitrary code.
  3. Code execution vulnerability in Doc object can be exploited remotely to execute arbitrary code.
  4. Type confusion vulnerability can be exploited to cause denial of service and execute arbitrary code.
  5. Use after free vulnerability in AcroForm Doc can be exploited remotely to execute arbitrary code.
  6. Type confusion vulnerability in Annotation can be exploited to cause denial of service.
  7. Out of bounds read vulnerability in Doc can be exploited remotely to obtain sensitive information.
  8. Out of bounds read vulnerability in File Parser can be exploited remotely to obtain sensitive information.
  9. Use after free vulnerability in AcroForm Signature can be exploited remotely to execute arbitrary code.
  10. Out of bounds read vulnerability in combobox can be exploited remotely to obtain sensitive information.
  11. Use after free vulnerability in Signature can be exploited remotely to execute arbitrary code.
  12. Out of bounds read vulnerability in AcroForm Doc can be exploited remotely to obtain sensitive information.
  13. Out of bounds read vulnerability in Bookmark can be exploited remotely to obtain sensitive information.
  14. Out of bounds read vulnerability in AcroForm out-of-bounds can be exploited remotely to obtain sensitive information.
  15. Use after free vulnerability in AcroForm Doc Object can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-41257
    critical
  • CVE-2023-32616
    critical
  • CVE-2023-35985
    critical
  • CVE-2023-40194
    critical
  • CVE-2023-38573
    critical
  • CVE-2023-51556
    warning
  • CVE-2023-51560
    warning
  • CVE-2023-51555
    warning
  • CVE-2023-51561
    warning
  • CVE-2023-51552
    warning
  • CVE-2023-51550
    warning
  • CVE-2023-51554
    warning
  • CVE-2023-51557
    warning
  • CVE-2023-51558
    warning
  • CVE-2023-51553
    warning
  • CVE-2023-51562
    warning
  • CVE-2023-51551
    warning
  • CVE-2023-51549
    warning
  • CVE-2023-51559
    warning

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.