2018-10-08 16:00:00
talos
PUBLISHED
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Softwares Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.