Kaspersky ID:
KLA12166
Дата обнаружения:
06/05/2021
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A use after free vulnerability can be exploited remotely via special crafted objects or forms to cause denial of service or execute arbitrary code.
  2. An out of bounds read vulnerability can be exploited remotely via special crafted file to cause denial of service or ontain sensitive information.
  3. An out of bounds read/write vulnerability can be exploited renotely via special crafted file to cause denial of service, obtain sensitive information and execute arbitrary code.
  4. An out of bounds read vulnerability can be exploited remotely via special crafted JS functions to cause denial of service, obtain sensitive information and cause denial of service.
  5. An out of bound read/write vulnerability can be exploited remotely via special crafted file to cause denial of service, obtain sensitive information and execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2021-31458
    high
  • CVE-2021-31454
    high
  • CVE-2021-31460
    high
  • CVE-2021-31456
    high
  • CVE-2021-31457
    high
  • CVE-2021-31451
    high
  • CVE-2021-31459
    high
  • CVE-2021-21822
    high
  • CVE-2021-31455
    high
  • CVE-2021-31452
    high
  • CVE-2021-31453
    high
  • CVE-2021-31450
    high
  • CVE-2021-31461
    high
  • CVE-2021-31441
    high
  • CVE-2021-31473
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.