4.3
CVSSv2

CVE-2009-0147

Published: 23/04/2009 Updated: 06/03/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9 and previous versions, and other products allow remote malicious users to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.

Vulnerable Product Search on Vulmon Subscribe to Product

glyphandcog xpdfreader

glyphandcog xpdfreader 3.00

foolabs xpdf 1.00a

glyphandcog xpdfreader 1.00

foolabs xpdf 0.92c

foolabs xpdf 0.92b

glyphandcog xpdfreader 0.80

foolabs xpdf 0.7a

glyphandcog xpdfreader 0.2

glyphandcog xpdfreader 2.00

glyphandcog xpdfreader 1.01

foolabs xpdf 0.92e

foolabs xpdf 0.92d

glyphandcog xpdfreader 0.91

glyphandcog xpdfreader 0.90

glyphandcog xpdfreader 0.4

glyphandcog xpdfreader 0.3

glyphandcog xpdfreader 2.02

glyphandcog xpdfreader 2.01

foolabs xpdf 0.93a

glyphandcog xpdfreader 0.93

foolabs xpdf 0.91b

foolabs xpdf 0.91a

foolabs xpdf 0.5a

glyphandcog xpdfreader 0.5

glyphandcog xpdfreader 3.01

glyphandcog xpdfreader 2.03

foolabs xpdf 0.93c

foolabs xpdf 0.93b

foolabs xpdf 0.92a

glyphandcog xpdfreader 0.92

foolabs xpdf 0.91c

glyphandcog xpdfreader 0.7

glyphandcog xpdfreader 0.6

apple cups 1.3.3

apple cups 1.3.4

apple cups 1.3.5

apple cups 1.2.4

apple cups 1.2.3

apple cups 1.2.11

apple cups 1.2.12

apple cups 1.1.3

apple cups 1.1.4

apple cups 1.1.6-2

apple cups 1.1.8

apple cups 1.1.11

apple cups 1.1.14

apple cups 1.1.19

apple cups 1.1.20

apple cups 1.1.21

apple cups 1.3.11

apple cups 1.3.2

apple cups 1.2.0

apple cups 1.2.5

apple cups 1.2.9

apple cups 1.2.10

apple cups 1.1.6

apple cups 1.1.6-1

apple cups 1.1.2

apple cups 1.1.10

apple cups 1.1.6-3

apple cups 1.1.17

apple cups 1.1.12

apple cups 1.1.23

apple cups 1.3.0

apple cups 1.3.1

apple cups 1.3.10

apple cups 1.2.1

apple cups 1.2.7

apple cups 1.2.8

apple cups 1.1.5-1

apple cups 1.1.5-2

apple cups 1.1.9-1

apple cups 1.1.10-1

apple cups 1.1.15

apple cups 1.1.18

apple cups 1.1.22

apple cups

apple cups 1.3.6

apple cups 1.3.8

apple cups 1.3.7

apple cups 1.2.2

apple cups 1.2.6

apple cups 1.1

apple cups 1.1.1

apple cups 1.1.5

apple cups 1.1.9

apple cups 1.1.7

apple cups 1.1.16

apple cups 1.1.13

Vendor Advisories

Debian Bug report logs - #524806 poppler: multiple vulnerabilities Package: poppler; Maintainer for poppler is Debian freedesktoporg maintainers <pkg-freedesktop-maintainers@listsaliothdebianorg>; Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Mon, 20 Apr 2009 02:06:01 UTC Severity: grave T ...
Debian Bug report logs - #524809 xpdf: multiple vulnerabilities Package: xpdf; Maintainer for xpdf is Debian QA Group <packages@qadebianorg>; Source for xpdf is src:xpdf (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Mon, 20 Apr 2009 02:27:02 UTC Severity: grave Tags: s ...
PDF import support has been disabled in KWord due to many security vulnerabilities that could be used by an attacker to run programs as your login ...
Will Dormann, Alin Rad Pop, Braden Thomas, and Drew Yao discovered that poppler contained multiple security issues in its JBIG2 decoder If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program ...
Several vulnerabilities have been identified in xpdf, a suite of tools for viewing and converting Portable Document Format (PDF) files The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0146 Multiple buffer overflows in the JBIG2 decoder in Xpdf 302pl2 and earlier, CUPS 139 and earlier, and oth ...
Synopsis Important: xpdf security update Type/Severity Security Advisory: Important Topic An updated xpdf package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: gpdf security update Type/Severity Security Advisory: Important Topic An updated gpdf package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team D ...
Synopsis Important: cups security update Type/Severity Security Advisory: Important Topic Updated cups packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 4 and 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: poppler security update Type/Severity Security Advisory: Important Topic Updated poppler packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: kdegraphics security update Type/Severity Security Advisory: Important Topic Updated kdegraphics packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having important security impact by the RedHat Security Response ...

References

CWE-189https://bugzilla.redhat.com/show_bug.cgi?id=490614http://www.redhat.com/support/errata/RHSA-2009-0430.htmlhttp://secunia.com/advisories/34755http://bugs.gentoo.org/show_bug.cgi?id=263028http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.htmlhttp://www.vupen.com/english/advisories/2009/1065http://secunia.com/advisories/34852http://wiki.rpath.com/Advisories:rPSA-2009-0059http://secunia.com/advisories/34481http://www.redhat.com/support/errata/RHSA-2009-0429.htmlhttp://www.vupen.com/english/advisories/2009/1066http://www.securitytracker.com/id?1022073http://www.redhat.com/support/errata/RHSA-2009-0431.htmlhttp://secunia.com/advisories/34291http://www.securityfocus.com/bid/34568http://www.vupen.com/english/advisories/2009/1077http://security.gentoo.org/glsa/glsa-200904-20.xmlhttp://wiki.rpath.com/Advisories:rPSA-2009-0061http://secunia.com/advisories/34756http://www.mandriva.com/security/advisories?name=MDVSA-2009:101http://www.debian.org/security/2009/dsa-1790http://secunia.com/advisories/34959http://rhn.redhat.com/errata/RHSA-2009-0458.htmlhttp://secunia.com/advisories/34963http://secunia.com/advisories/35037http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477http://secunia.com/advisories/35065http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-133A.htmlhttp://www.redhat.com/support/errata/RHSA-2009-0480.htmlhttp://secunia.com/advisories/35074http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://support.apple.com/kb/HT3549http://www.vupen.com/english/advisories/2009/1297http://secunia.com/advisories/34991http://www.debian.org/security/2009/dsa-1793http://secunia.com/advisories/35064http://support.apple.com/kb/HT3639http://www.vupen.com/english/advisories/2009/1621http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.htmlhttp://secunia.com/advisories/35618https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.htmlhttp://secunia.com/advisories/35685http://www.vupen.com/english/advisories/2010/1040http://www.mandriva.com/security/advisories?name=MDVSA-2010:087https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941http://www.securityfocus.com/archive/1/502761/100/0/threadedhttp://www.securityfocus.com/archive/1/502750/100/0/threadedhttps://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806https://usn.ubuntu.com/973-1/