HTTP: Foxit PhantomPDF text Field Object Use After Free

This signature detects attempts to exploit a known vulnerability against Foxit PhantomPDF. A successful attack can lead to arbitrary code execution.

Extended Description

This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of text field objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9400.

References

CVE: CVE-2020-8846

Short Name
HTTP:STC:DL:FOXIT-FLDOBJ-UAF
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
After CVE-2020-8846 Field Foxit Free Object PhantomPDF Use text
Release Date
06/15/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3377
False Positive
Unknown
CVSS Score

6.8

Found a potential security threat?