HomeCyber BalkansFoxit PDF Reader Vulnerability Allows Attackers to Execute Arbitrary Code

Foxit PDF Reader Vulnerability Allows Attackers to Execute Arbitrary Code

Published on

spot_img

In a recent development, researchers shed light on six new security vulnerabilities discovered across various software platforms. One critical vulnerability was found in Foxit PDF Reader, a popular alternative to Adobe Acrobat, which could potentially allow attackers to execute arbitrary code on the target system.

The vulnerability identified in Foxit PDF Reader is a critical use-after-free vulnerability, which hackers could exploit to run malicious code on a targeted machine. This vulnerability can be triggered when a user opens a specially crafted PDF file or visits a malicious website with the Foxit PDF Reader browser extension enabled. By exploiting this vulnerability, attackers can corrupt memory and take control of the affected device by manipulating the JavaScript content of the PDF.

Furthermore, Veertu’s Anka Build software, designed for testing macOS or iOS applications in CI/CD environments, was found to have three vulnerabilities. Two of these vulnerabilities, TALOS-2024-2059 and TALOS-2024-2061, are directory traversal issues that could allow unauthorized access to files by sending malicious HTTP requests. The third vulnerability, TALOS-2024-2060, is a privilege escalation vulnerability that could enable a low-privileged user to gain root access through the software update mechanism.

In addition to these findings, two critical vulnerabilities were discovered within the G Structured File Library (libgsf) associated with the GNOME project. These vulnerabilities, TALOS-2024-2068 (CVE-2024-36474) and TALOS-2024-2069 (CVE-2024-42415), stem from integer overflows during array index manipulation and sector allocation table processing, respectively. Exploiting these vulnerabilities could lead to remote code execution if a user opens a maliciously crafted file, allowing unauthorized access to the system.

According to Ciso Talos, users of Anka Build software are currently vulnerable to significant security risks due to these identified vulnerabilities. To mitigate the potential exploitation of these vulnerabilities, immediate attention and action are required to secure the system and prevent unauthorized access.

It is crucial for users of these affected software platforms to stay vigilant and update their systems with the latest security patches and fixes to protect against potential cyber threats. By being proactive and implementing best practices for cybersecurity, users can reduce the risk of falling victim to malicious attacks and safeguard their sensitive information and data.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...