Security News > 2021 > July > Foxit Plugs Multiple Security Holes in PDF Reader, Editor
Foxit Software this week released security updates for its PDF Reader and PDF Editor applications, to address multiple vulnerabilities, including some leading to remote code execution.
All three flaws are use-after-free vulnerabilities in the JavaScript engine of PDF Reader that an attacker could exploit by tricking the target into opening a malicious PDF file.
Foxit also addressed multiple use-after-free vulnerabilities in the way the applications handle the annotation objects in certain PDF files, "If the same Annotation dictionary is referenced in the page structures for different pages."
The vulnerabilities occur when an Annotation dictionary has multiple annotation objects associated to it and could lead to remote code execution, Foxit explained.
Another security issue covered with the update is a use-after-free when traversing bookmark nodes in certain PDF files, and which too could lead to the execution of code remotely.
Foxit also addressed potential security issues related to the parsing of XML data with too many embedded nodes, to the execution of the submitForm function, or the parsing of specially crafted PDF files.