Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch - Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html - | |
References | () http://poppler.freedesktop.org/ - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/37028 - Vendor Advisory | |
References | () http://secunia.com/advisories/37034 - Vendor Advisory | |
References | () http://secunia.com/advisories/37037 - Vendor Advisory | |
References | () http://secunia.com/advisories/37043 - Vendor Advisory | |
References | () http://secunia.com/advisories/37051 - Vendor Advisory | |
References | () http://secunia.com/advisories/37053 - Vendor Advisory | |
References | () http://secunia.com/advisories/37054 - Vendor Advisory | |
References | () http://secunia.com/advisories/37061 - Vendor Advisory | |
References | () http://secunia.com/advisories/37077 - Vendor Advisory | |
References | () http://secunia.com/advisories/37079 - Vendor Advisory | |
References | () http://secunia.com/advisories/37114 - | |
References | () http://secunia.com/advisories/37159 - | |
References | () http://secunia.com/advisories/39327 - | |
References | () http://secunia.com/advisories/39938 - | |
References | () http://securitytracker.com/id?1023029 - Patch | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1 - | |
References | () http://www.debian.org/security/2009/dsa-1941 - | |
References | () http://www.debian.org/security/2010/dsa-2028 - | |
References | () http://www.debian.org/security/2010/dsa-2050 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:287 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:334 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:175 - | |
References | () http://www.ocert.org/advisories/ocert-2009-016.html - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/5 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/6 - | |
References | () http://www.securityfocus.com/bid/36703 - Exploit, Patch | |
References | () http://www.ubuntu.com/usn/USN-850-1 - | |
References | () http://www.ubuntu.com/usn/USN-850-3 - | |
References | () http://www.vupen.com/english/advisories/2009/2924 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2925 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2926 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2928 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0802 - | |
References | () http://www.vupen.com/english/advisories/2010/1220 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=526637 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/53794 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9536 - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1501.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1502.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1503.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1504.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1512.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1513.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html - |
Information
Published : 2009-10-21 17:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3608
Mitre link : CVE-2009-3608
CVE.ORG link : CVE-2009-3608
JSON object : View
Products Affected
glyphandcog
- xpdfreader
tetex
- tetex
gnome
- gpdf
kde
- kpdf
glyph_and_cog
- pdftops
poppler
- poppler
foolabs
- xpdf
CWE
CWE-189
Numeric Errors