5.3

CVE-2018-18689

The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AvanquestExpert Pdf Ultimate Version12.0.20
   MicrosoftWindows Version-
AvanquestPdf Experte Ultimate Version9.0.270
   MicrosoftWindows Version-
FoxitsoftwareFoxit Reader Version9.1.0
   MicrosoftWindows Version-
FoxitsoftwareFoxit Reader Version9.2.0.9297
   MicrosoftWindows Version-
FoxitsoftwareFoxit Reader Version9.3.0.10826
   MicrosoftWindows Version-
GonitroNitro Pro Version11.0.3.173
   MicrosoftWindows Version-
GonitroNitro Reader Version5.5.9.2
   MicrosoftWindows Version-
IskysoftPdf Editor 6 Version6.4.2.3521 SwEditionprofessional
   MicrosoftWindows Version-
IskysoftPdfelement6 Version6.8.0.3523 SwEditionprofessional
   MicrosoftWindows Version-
IskysoftPdfelement6 Version6.8.4.3921 SwEditionprofessional
   MicrosoftWindows Version-
Pdf-xchangePdf-xchange Editor Version7.0.237.1
   MicrosoftWindows Version-
Pdf-xchangePdf-xchange Editor Version7.0.326
   MicrosoftWindows Version-
PdfforgePdf Architect Version6.0.37
   MicrosoftWindows Version-
PdfforgePdf Architect Version6.1.24.1862
   MicrosoftWindows Version-
QoppaPdf Studio Version12.0.7 SwEditionprofessional
   MicrosoftWindows Version-
QoppaPdf Studio Viewer 2018 Version2018.0.1
   MicrosoftWindows Version-
QoppaPdf Studio Viewer 2018 Version2018.2.0
   MicrosoftWindows Version-
SodapdfSoda Pdf Version9.3.17
   MicrosoftWindows Version-
SodapdfSoda Pdf Desktop Version10.2.09
   MicrosoftWindows Version-
SodapdfSoda Pdf Desktop Version10.2.16.1217
   MicrosoftWindows Version-
Soft-xpansionPerfect Pdf 10 Version10.0.0.1 SwEditionpremium
   MicrosoftWindows Version-
Soft-xpansionPerfect Pdf Reader Version13.0.3
   MicrosoftWindows Version-
Soft-xpansionPerfect Pdf Reader Version13.1.5
   MicrosoftWindows Version-
Tracker-softwarePdf-xchange Viewer Version2.5
   MicrosoftWindows Version-
VisagesoftExpert Pdf Reader Version9.0.180
   MicrosoftWindows Version-
FoxitsoftwareFoxit Reader Version9.1.0
   ApplemacOS Version-
FoxitsoftwareFoxit Reader Version9.2.0
   ApplemacOS Version-
IskysoftPdf Editor 6 Version6.6.2.3315 SwEditionprofessional
   ApplemacOS Version-
IskysoftPdf Editor 6 Version6.7.6.3399 SwEditionprofessional
   ApplemacOS Version-
IskysoftPdfelement6 Version6.7.1.3355 SwEditionprofessional
   ApplemacOS Version-
IskysoftPdfelement6 Version6.7.6.3399 SwEditionprofessional
   ApplemacOS Version-
QoppaPdf Studio Version12.0.7 SwEditionprofessional
   ApplemacOS Version-
QoppaPdf Studio Viewer 2018 Version2018.0.1
   ApplemacOS Version-
QoppaPdf Studio Viewer 2018 Version2018.2.0
   ApplemacOS Version-
FoxitsoftwareFoxit Reader Version9.1.0
   LinuxLinux Kernel Version-
FoxitsoftwareFoxit Reader Version9.2.0
   LinuxLinux Kernel Version-
QoppaPdf Studio Version12.0.7 SwEditionprofessional
   LinuxLinux Kernel Version-
QoppaPdf Studio Viewer 2018 Version2018.0.1
   LinuxLinux Kernel Version-
QoppaPdf Studio Viewer 2018 Version2018.2.0
   LinuxLinux Kernel Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.008
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-347 Improper Verification of Cryptographic Signature

The product does not verify, or incorrectly verifies, the cryptographic signature for data.