HTTP: Foxit Reader 3D Page Object Use-After-Free

This signature detects attempts to exploit a known vulnerability against Foxit reader. A successful attack can lead to arbitrary code execution.

Extended Description

A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

References

CVE: CVE-2024-49576

Short Name
HTTP:STC:FOXIT-3D-PAGE-UAF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
3D CVE-2024-47810 CVE-2024-49576 Foxit Object Page Reader Use-After-Free
Release Date
02/04/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3779
False Positive
Unknown

Found a potential security threat?