First published: Tue Mar 24 2009(Updated: )
Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | =1.1.17 | |
CUPS | =1.1.22 | |
CUPS | =1.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0791 has a high severity rating due to the potential for denial of service and arbitrary code execution.
To fix CVE-2009-0791, upgrade to a patched version of CUPS that addresses the integer overflow vulnerabilities.
CVE-2009-0791 affects CUPS versions 1.1.17, 1.1.22, and 1.3.7.
Yes, CVE-2009-0791 allows remote attackers to exploit the vulnerability through crafted PDF files.
The impact of CVE-2009-0791 includes application crashes and the possibility of executing arbitrary code.