Kaspersky ID:
KLA64774
Дата обнаружения:
05/03/2024
Обновлено:
26/03/2025

Описание

Multiple vulnerabilities were found in Foxit PDF Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. Code execution vulnerability can be exploited remotely to execute arbitrary code.
  2. Use after free vulnerability in AcroForm can be exploited to execute arbitrary code.
  3. Use after free vulnerability in Doc Object can be exploited to execute arbitrary code.
  4. Out of bounds memory read vulnerability in Annotation can be exploited to obtain sensitive information.
  5. Out of bounds memory read vulnerability in template can be exploited to execute arbitrary code.
  6. Use after free vulnerability in File Parsing can be exploited to execute arbitrary code.
  7. Type confusion vulnerability in AcroForm Annotation can be exploited to execute arbitrary code.
  8. Use after free vulnerability in template can be exploited to execute arbitrary code.
  9. Use after free vulnerability in Annotation can be exploited to obtain sensitive information.
  10. Out of bounds memory read vulnerability in U3D File Parsing can be exploited to obtain sensitive information.
  11. Out of bounds memory read vulnerability in AcroForm Annotation can be exploited to obtain sensitive information.
  12. Out of bounds memory read vulnerability in Doc Object can be exploited to execute arbitrary code.
  13. Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
  14. Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
  15. Out of bounds memory read vulnerability in AcroForm 3D can be exploited to execute arbitrary code.
  16. Out of bounds memory read vulnerability in AcroForm can be exploited to execute arbitrary code.
  17. Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
  18. Out of bounds memory read vulnerability in AcroForm can be exploited to obtain sensitive information.
  19. Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
  20. Elevation of privilege vulnerability can be exploited remotely to gain privileges.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-25858
    critical
  • CVE-2024-30328
    critical
  • CVE-2024-30322
    critical
  • CVE-2024-30333
    critical
  • CVE-2024-30350
    warning
  • CVE-2024-30346
    critical
  • CVE-2024-30352
    critical
  • CVE-2024-30366
    critical
  • CVE-2024-30358
    critical
  • CVE-2024-30323
    critical
  • CVE-2024-30362
    critical
  • CVE-2024-30325
    critical
  • CVE-2024-30357
    critical
  • CVE-2024-30344
    critical
  • CVE-2024-30327
    critical
  • CVE-2024-30339
    critical
  • CVE-2024-30337
    critical
  • CVE-2024-30329
    warning
  • CVE-2024-30347
    warning
  • CVE-2024-30351
    critical
  • CVE-2024-30334
    critical
  • CVE-2024-30367
    critical
  • CVE-2024-30326
    critical
  • CVE-2024-30335
    warning
  • CVE-2024-30345
    critical
  • CVE-2024-30341
    critical
  • CVE-2024-30336
    critical
  • CVE-2024-30338
    critical
  • CVE-2024-30324
    critical
  • CVE-2024-30371
    critical
  • CVE-2024-30365
    critical
  • CVE-2024-30343
    critical
  • CVE-2024-30354
    critical
  • CVE-2024-30349
    critical
  • CVE-2024-30340
    warning
  • CVE-2024-30330
    critical
  • CVE-2024-30359
    critical
  • CVE-2024-30355
    critical
  • CVE-2024-30348
    critical
  • CVE-2024-30363
    warning
  • CVE-2024-30332
    critical
  • CVE-2024-30356
    warning
  • CVE-2024-30364
    warning
  • CVE-2024-30353
    critical
  • CVE-2024-30360
    critical
  • CVE-2024-30331
    critical
  • CVE-2024-30361
    critical
  • CVE-2024-30342
    critical
  • CVE-2024-32488
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.