#VU12821 Insecure DLL loading in Foxit PDF Editor (formerly Foxit PhantomPDF)
Published: May 18, 2018
Vulnerability identifier: #VU12821
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-427
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Foxit PDF Editor (formerly Foxit PhantomPDF)
Foxit PDF Editor (formerly Foxit PhantomPDF)
Software vendor:
Foxit Software Inc.
Foxit Software Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to the application passes an insufficiently qualified path in loading an external library when a user launches the application. A remote attacker can place a malicious DLL in the specified path directory and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to the application passes an insufficiently qualified path in loading an external library when a user launches the application. A remote attacker can place a malicious DLL in the specified path directory and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Update to version 8.3.6.