Unknown
CVE-2018-18688
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2018-18688
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice, Master PDF Editor, Nitro Pro, Nitro Reader, Nuance Power PDF Standard, PDF Editor 6 Pro, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, Perfect PDF 10 Premium, and Perfect PDF Reader.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- code-industry,
- foxitsoftware,
- gonitro,
- iskysoft,
- libreoffice,
- nuance,
- qoppa,
- soft-xpansion
Products
- foxit reader 9.1.0,
- foxit reader 9.2.0,
- foxit reader 9.4,
- libreoffice 6.0.6.2,
- libreoffice 6.1.0.3,
- libreoffice 6.1.3.2,
- master pdf editor 5.1.12,
- master pdf editor 5.1.24,
- master pdf editor 5.1.68,
- nitro pro 11.0.3.173,
- nitro reader 5.5.9.2,
- pdf editor 6 6.4.2.3521,
- pdf editor 6 6.6.2.3315,
- pdf editor 6 6.7.6.3399,
- pdf studio 12.0.7,
- pdf studio viewer 2018 2018.0.1,
- pdf studio viewer 2018 2018.2.0,
- pdfelement6 6.7.1.3355,
- pdfelement6 6.7.6.3399,
- pdfelement6 6.8.0.3523,
- pdfelement6 6.8.4.3921,
- perfect pdf 10 10.0.0.1,
- perfect pdf reader 13.0.3,
- perfect pdf reader 13.1.5,
- phantompdf,
- phantompdf 8.3.9,
- power pdf standard 3.0.0.17,
- power pdf standard 3.0.0.30,
- power pdf standard 7.0
References
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: