First published: Thu Apr 16 2009(Updated: )
Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foolabs Xpdf | =0.91c | |
Foolabs Xpdf | =0.91b | |
Apple Cups | =1.3.9 | |
Foolabs Xpdf | =0.93b | |
Foolabs Xpdf | =1.00a | |
Foolabs Xpdf | =0.91a | |
Foolabs Xpdf | =0.92e | |
Foolabs Xpdf | =0.5a | |
Foolabs Xpdf | =0.92b | |
Foolabs Xpdf | =0.93c | |
Foolabs Xpdf | =0.92c | |
Foolabs Xpdf | =0.7a | |
Foolabs Xpdf | =0.93a | |
Foolabs Xpdf | =3.0.1 | |
Foolabs Xpdf | =0.92d | |
Foolabs Xpdf | =0.92a | |
Glyphandcog Xpdfreader | =0.2 | |
Glyphandcog Xpdfreader | =0.3 | |
Glyphandcog Xpdfreader | =0.4 | |
Glyphandcog Xpdfreader | =0.5 | |
Glyphandcog Xpdfreader | =0.6 | |
Glyphandcog Xpdfreader | =0.80 | |
Glyphandcog Xpdfreader | =0.90 | |
Glyphandcog Xpdfreader | =1.00 | |
Glyphandcog Xpdfreader | =1.01 | |
Glyphandcog Xpdfreader | =2.00 | |
Glyphandcog Xpdfreader | =2.01 | |
Glyphandcog Xpdfreader | =2.03 | |
Glyphandcog Xpdfreader | =3.00 | |
Glyphandcog Xpdfreader | =0.7 | |
Glyphandcog Xpdfreader | =0.91 | |
Glyphandcog Xpdfreader | =0.92 | |
Glyphandcog Xpdfreader | =0.93 | |
Glyphandcog Xpdfreader | =2.02 | |
Glyphandcog Xpdfreader | <=3.02 | |
redhat/xpdf | <1:2.02-14.el3 | 1:2.02-14.el3 |
redhat/cups | <1:1.1.22-0.rc1.9.27.el4_7.5 | 1:1.1.22-0.rc1.9.27.el4_7.5 |
redhat/xpdf | <1:3.00-20.el4 | 1:3.00-20.el4 |
redhat/kdegraphics | <7:3.3.1-13.el4 | 7:3.3.1-13.el4 |
redhat/gpdf | <0:2.8.2-7.7.2.el4_7.4 | 0:2.8.2-7.7.2.el4_7.4 |
redhat/cups | <1:1.3.7-8.el5_3.4 | 1:1.3.7-8.el5_3.4 |
redhat/kdegraphics | <7:3.5.4-12.el5_3 | 7:3.5.4-12.el5_3 |
redhat/poppler | <0:0.5.4-4.4.el5_3.9 | 0:0.5.4-4.4.el5_3.9 |
redhat/tetex | <0:3.0-33.8.el5_5.5 | 0:3.0-33.8.el5_5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)