Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-14458 | First vendor Publication | 2018-04-23 |
Vendor | Cve | Last vendor Modification | 2023-01-28 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 8.3.2.25013. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14458 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-416 | Use After Free |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-12-13 | TRUFFLEHUNTER TALOS-2017-0506 attack attempt RuleID : 45159 - Revision : 1 - Type : FILE-PDF |
2017-12-13 | TRUFFLEHUNTER TALOS-2017-0506 attack attempt RuleID : 45158 - Revision : 1 - Type : FILE-PDF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-12-21 | Name : A PDF toolkit installed on the remote Windows host is affected by multiple vu... File : foxit_phantom_8_3_6.nasl - Type : ACT_GATHER_INFO |
2018-12-21 | Name : A PDF toolkit installed on the remote Windows host is affected by multiple vu... File : foxit_phantom_9_1_0.nasl - Type : ACT_GATHER_INFO |
2018-04-27 | Name : A PDF toolkit installed on the remote Windows host is affected by multiple vu... File : foxit_phantom_9_1_0_5096.nasl - Type : ACT_GATHER_INFO |
2018-04-27 | Name : A PDF viewer installed on the remote Windows host is affected by multiple vul... File : foxit_reader_9_1_0_5096.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/103942 |
MISC | https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0506 |
SECTRACK | http://www.securitytracker.com/id/1040733 |
Alert History
Date | Informations |
---|---|
2023-01-28 09:27:44 |
|
2022-04-20 00:23:34 |
|
2022-02-10 01:27:50 |
|
2021-05-04 12:57:37 |
|
2021-04-22 02:09:40 |
|
2020-05-23 00:56:07 |
|
2018-05-25 21:19:31 |
|
2018-04-25 09:19:17 |
|
2018-04-23 21:19:43 |
|