// For flags

CVE-2020-6115

 

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An exploitable vulnerability exists in the cross-reference table repairing functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242. While searching for an object identifier in a malformed document that is missing from the cross-reference table, the application will save a reference to the object’s cross-reference table entry inside a stack variable. If the referenced object identifier is not found, the application may resize the cross-reference table which can change the scope of its entry. Later when the application tries to reference cross-reference entry via the stack variable, the application will access memory belonging to the recently freed table causing a use-after-free condition. A specially crafted document can be delivered by an attacker and loaded by a victim in order to trigger this vulnerability.

Se presenta una vulnerabilidad explotable en la funcionalidad cross-reference table repairing de Nitro Pro de Nitro Software, Inc versión 13.13.2.242. Mientras busca un identificador de objeto en un documento malformado que se encuentra en la tabla de referencias cruzadas, la aplicación guardará una referencia a la entrada de la tabla de referencias cruzadas del objeto dentro de una variable de pila. Si no se encuentra el identificador del objeto al que se hace referencia, la aplicación puede cambiar el tamaño de la tabla de referencias cruzadas, lo que puede cambiar el alcance de su entrada. Más tarde, cuando la aplicación intenta hacer referencia a una entrada de referencia cruzada por medio de la variable de pila, la aplicación accederá a la memoria que pertenece a la tabla liberada recientemente, causando una condición de uso de la memoria previamente liberada. Un atacante puede entregar un documento especialmente diseñado y cargado por una víctima para desencadenar esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-07 CVE Reserved
  • 2020-09-17 CVE Published
  • 2024-01-21 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gonitro
Search vendor "Gonitro"
Nitro Pro
Search vendor "Gonitro" for product "Nitro Pro"
13.13.2.242
Search vendor "Gonitro" for product "Nitro Pro" and version "13.13.2.242"
-
Affected
Gonitro
Search vendor "Gonitro"
Nitro Pro
Search vendor "Gonitro" for product "Nitro Pro"
13.16.2.300
Search vendor "Gonitro" for product "Nitro Pro" and version "13.16.2.300"
-
Affected