8.8
CVSSv3

CVE-2018-9958

Published: 17/05/2018 Updated: 28/11/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Text Annotations. When setting the point attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5620.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

foxitsoftware foxit reader

foxitsoftware phantompdf

Exploits

%PDF 1 0 obj <</Pages 1 0 R /OpenAction 2 0 R>> 2 0 obj <</S /JavaScript /JS ( /* Foxit Reader Remote Code Execution Exploit ========================================== Written by: Steven Seeley (mr_me) of Source Incite Date: 22/06/2018 Technical details: srcinciteio/blog/2018/06/22/foxes-among-us-foxit-reader-vulnerab ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT def initialize(info={}) super(update_info(info, 'Name' => 'Foxit PDF Reader Pointer Ove ...
Foxit Reader version 9011049 remote code execution exploit with DEP bypass on heap with shellcode ...
Foxit Reader version 9011049 suffers from an arbitrary code execution vulnerability This is a variant exploit of the original finding from 2018 ...
Foxit Reader version 9011049 suffers from a remote code execution vulnerability ...
Foxit PDF Reader version 9011049 has a use-after-free vulnerability in the Text Annotations component and the TypedArray's use uninitialized pointers The vulnerabilities can be combined to leak a vtable memory address, which can be adjusted to point to the base address of the executable A ROP chain can be constructed that will execute when Fox ...

Github Repositories

Foxit Reader version 9.0.1.1049 Use After Free with ASLR and DEP bypass on heap

Custom Exploit : Foxit Reader version 9011049 Use After Free with ASLR and DEP bypass on heap My Custom Exploit : Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958 Custom exploit for Win 7 Has space for shellcode My custom ROP chain makes space for shellcode in the heap For Win 7