CVE-2023-42067

5.5 MEDIUM

📋 TL;DR

This vulnerability in PDF-XChange Editor allows remote attackers to read sensitive information from memory when processing malicious JB2 files. Attackers can leverage this information disclosure with other vulnerabilities to potentially execute arbitrary code. Users who open untrusted PDF files containing JB2 images are affected.

💻 Affected Systems

Products:
  • PDF-XChange Editor
Versions: Versions prior to 10.1.1.380
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable versions are affected when processing JB2 files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure combined with other vulnerabilities could lead to arbitrary code execution in the context of the current user process.

🟠

Likely Case

Sensitive memory contents disclosure, potentially revealing credentials, encryption keys, or other confidential data.

🟢

If Mitigated

Limited information disclosure without code execution if proper sandboxing and memory protections are in place.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but web-based delivery is common.
🏢 Internal Only: MEDIUM - Similar risk internally if users open malicious attachments or files from untrusted sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious file. Exploit requires combining with other vulnerabilities for code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.1.380 and later

Vendor Advisory: https://www.tracker-software.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from tracker-software.com 2. Run installer 3. Restart system 4. Verify version is 10.1.1.380 or higher

🔧 Temporary Workarounds

Disable JB2 file processing

windows

Configure PDF-XChange Editor to block JB2 file processing if not required

Application sandboxing

windows

Run PDF-XChange Editor in sandboxed environment to limit impact

🧯 If You Can't Patch

  • Restrict user permissions to limit potential damage from code execution
  • Implement application whitelisting to prevent unauthorized PDF viewers

🔍 How to Verify

Check if Vulnerable:

Check Help > About in PDF-XChange Editor for version number

Check Version:

Not applicable - check via GUI Help > About

Verify Fix Applied:

Confirm version is 10.1.1.380 or higher in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing JB2 files
  • Unusual memory access patterns

Network Indicators:

  • Downloads of PDF files with JB2 images from untrusted sources

SIEM Query:

EventID=1000 OR EventID=1001 Source="PDF-XChange Editor" AND Keywords="Faulting module name"

🔗 References

📤 Share & Export