Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch - Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html - | |
References | () http://poppler.freedesktop.org/ - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/37028 - Vendor Advisory | |
References | () http://secunia.com/advisories/37034 - Vendor Advisory | |
References | () http://secunia.com/advisories/37037 - Vendor Advisory | |
References | () http://secunia.com/advisories/37043 - Vendor Advisory | |
References | () http://secunia.com/advisories/37051 - Vendor Advisory | |
References | () http://secunia.com/advisories/37053 - Vendor Advisory | |
References | () http://secunia.com/advisories/37054 - Vendor Advisory | |
References | () http://secunia.com/advisories/37061 - Vendor Advisory | |
References | () http://secunia.com/advisories/37077 - Vendor Advisory | |
References | () http://secunia.com/advisories/37079 - Vendor Advisory | |
References | () http://secunia.com/advisories/37114 - | |
References | () http://secunia.com/advisories/37159 - | |
References | () http://secunia.com/advisories/39327 - | |
References | () http://secunia.com/advisories/39938 - | |
References | () http://securitytracker.com/id?1023029 - Patch | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1 - | |
References | () http://www.debian.org/security/2009/dsa-1941 - | |
References | () http://www.debian.org/security/2010/dsa-2028 - | |
References | () http://www.debian.org/security/2010/dsa-2050 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:287 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:334 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:175 - | |
References | () http://www.ocert.org/advisories/ocert-2009-016.html - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/5 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/01/6 - | |
References | () http://www.securityfocus.com/bid/36703 - Exploit, Patch | |
References | () http://www.ubuntu.com/usn/USN-850-1 - | |
References | () http://www.ubuntu.com/usn/USN-850-3 - | |
References | () http://www.vupen.com/english/advisories/2009/2924 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2925 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2926 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2928 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0802 - | |
References | () http://www.vupen.com/english/advisories/2010/1220 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=526637 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/53794 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9536 - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1501.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1502.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1503.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1504.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1512.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2009-1513.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html - |
Information
Published : 2009-10-21 17:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-3608
Mitre link : CVE-2009-3608
CVE.ORG link : CVE-2009-3608
JSON object : View
Products Affected
poppler
- poppler
kde
- kpdf
tetex
- tetex
foolabs
- xpdf
glyph_and_cog
- pdftops
glyphandcog
- xpdfreader
gnome
- gpdf
CWE
CWE-189
Numeric Errors