CVE-2025-34106: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Burnaware PDF Shaper
A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an image using the 'Convert PDF to Image' functionality. An attacker can exploit this vulnerability by tricking a user into opening a maliciously crafted PDF file, leading to arbitrary code execution under the context of the user. This vulnerability has been verified on Windows XP, 7, 8, and 10 platforms using the PDFTools.exe component.
AI Analysis
Technical Summary
CVE-2025-34106 is a high-severity buffer overflow vulnerability identified in Burnaware's PDF Shaper software, specifically versions 3.5 and 3.6. The flaw exists within the 'Convert PDF to Image' functionality, where processing a specially crafted PDF file can cause improper restriction of operations within the bounds of a memory buffer (CWE-119). This vulnerability allows an attacker to execute arbitrary code under the context of the logged-in user by tricking them into opening a malicious PDF file. The vulnerability has been confirmed on multiple Windows platforms including XP, 7, 8, and 10, and involves the PDFTools.exe component. The CVSS 4.0 base score of 8.4 reflects a high impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:A). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact metrics, meaning successful exploitation could lead to full system compromise or data breach. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability is related to common memory safety issues (CWE-119 and CWE-120), which are often exploited for remote code execution or privilege escalation. Given the nature of the flaw, attackers would likely rely on social engineering to convince users to open malicious PDFs, making user awareness and endpoint protections critical.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on PDF Shaper for document processing or conversion tasks. Exploitation could lead to arbitrary code execution, enabling attackers to deploy malware, ransomware, or conduct espionage by gaining unauthorized access to sensitive data. The impact is particularly severe for organizations handling confidential or regulated data, such as financial institutions, healthcare providers, and government agencies. Since the vulnerability requires user interaction but no privileges, it can be exploited in environments where users have standard permissions, potentially leading to lateral movement within networks. The presence of affected Windows versions including legacy systems like Windows XP and 7 increases risk in organizations with outdated infrastructure. The lack of patches means organizations must rely on interim mitigations, increasing exposure duration. Additionally, the high confidentiality and integrity impact could result in data breaches, regulatory fines under GDPR, and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting the use of the 'Convert PDF to Image' functionality in PDF Shaper until a patch is available. 2. Implement strict email filtering and attachment scanning to block or quarantine suspicious PDF files, especially those originating from untrusted sources. 3. Deploy endpoint protection solutions with behavior-based detection capable of identifying exploitation attempts related to buffer overflows and arbitrary code execution. 4. Educate users on the risks of opening unsolicited or unexpected PDF attachments, emphasizing caution with document conversion tools. 5. Where possible, upgrade or replace PDF Shaper with alternative software that is not affected by this vulnerability or ensure usage of updated versions once patches are released. 6. Employ application whitelisting and privilege restrictions to limit the execution context of PDFTools.exe, reducing the potential impact of exploitation. 7. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-34106: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Burnaware PDF Shaper
Description
A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an image using the 'Convert PDF to Image' functionality. An attacker can exploit this vulnerability by tricking a user into opening a maliciously crafted PDF file, leading to arbitrary code execution under the context of the user. This vulnerability has been verified on Windows XP, 7, 8, and 10 platforms using the PDFTools.exe component.
AI-Powered Analysis
Technical Analysis
CVE-2025-34106 is a high-severity buffer overflow vulnerability identified in Burnaware's PDF Shaper software, specifically versions 3.5 and 3.6. The flaw exists within the 'Convert PDF to Image' functionality, where processing a specially crafted PDF file can cause improper restriction of operations within the bounds of a memory buffer (CWE-119). This vulnerability allows an attacker to execute arbitrary code under the context of the logged-in user by tricking them into opening a malicious PDF file. The vulnerability has been confirmed on multiple Windows platforms including XP, 7, 8, and 10, and involves the PDFTools.exe component. The CVSS 4.0 base score of 8.4 reflects a high impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:A). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact metrics, meaning successful exploitation could lead to full system compromise or data breach. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability is related to common memory safety issues (CWE-119 and CWE-120), which are often exploited for remote code execution or privilege escalation. Given the nature of the flaw, attackers would likely rely on social engineering to convince users to open malicious PDFs, making user awareness and endpoint protections critical.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on PDF Shaper for document processing or conversion tasks. Exploitation could lead to arbitrary code execution, enabling attackers to deploy malware, ransomware, or conduct espionage by gaining unauthorized access to sensitive data. The impact is particularly severe for organizations handling confidential or regulated data, such as financial institutions, healthcare providers, and government agencies. Since the vulnerability requires user interaction but no privileges, it can be exploited in environments where users have standard permissions, potentially leading to lateral movement within networks. The presence of affected Windows versions including legacy systems like Windows XP and 7 increases risk in organizations with outdated infrastructure. The lack of patches means organizations must rely on interim mitigations, increasing exposure duration. Additionally, the high confidentiality and integrity impact could result in data breaches, regulatory fines under GDPR, and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting the use of the 'Convert PDF to Image' functionality in PDF Shaper until a patch is available. 2. Implement strict email filtering and attachment scanning to block or quarantine suspicious PDF files, especially those originating from untrusted sources. 3. Deploy endpoint protection solutions with behavior-based detection capable of identifying exploitation attempts related to buffer overflows and arbitrary code execution. 4. Educate users on the risks of opening unsolicited or unexpected PDF attachments, emphasizing caution with document conversion tools. 5. Where possible, upgrade or replace PDF Shaper with alternative software that is not affected by this vulnerability or ensure usage of updated versions once patches are released. 6. Employ application whitelisting and privilege restrictions to limit the execution context of PDFTools.exe, reducing the potential impact of exploitation. 7. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.559Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687654a5a83201eaaccea505
Added to database: 7/15/2025, 1:16:21 PM
Last enriched: 7/15/2025, 1:33:13 PM
Last updated: 1/7/2026, 6:09:56 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.