First published: Wed Apr 15 2009(Updated: )
An integer overflow was found in poppler's SplashBitmap::SplashBitmap method. A malicious PDF file could cause poppler to execute with permissions of the user calling the library. Will Dormann of the CERT/CC created the extensive testsuite for the JBIG2 decoder in various PDF libraries that found this flaw. Acknowledgements: Red Hat would like to thank Will Dormann of the CERT/CC for responsibly reporting this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Poppler Poppler | =0.7.3 | |
Poppler Poppler | =0.3.2 | |
Poppler Poppler | =0.10.3 | |
Poppler Poppler | =0.4.0 | |
Poppler Poppler | =0.8.5 | |
Poppler Poppler | =0.9.3 | |
Poppler Poppler | =0.10.1 | |
Poppler Poppler | =0.10.0 | |
Poppler Poppler | =0.7.1 | |
Poppler Poppler | =0.6.1 | |
Poppler Poppler | =0.3.1 | |
Poppler Poppler | =0.5.2 | |
Poppler Poppler | =0.5.91 | |
Poppler Poppler | =0.6.0 | |
Poppler Poppler | =0.3.3 | |
Poppler Poppler | =0.4.2 | |
Poppler Poppler | =0.10.4 | |
Poppler Poppler | =0.9.2 | |
Poppler Poppler | =0.6.4 | |
Poppler Poppler | =0.1.2 | |
Poppler Poppler | =0.8.0 | |
Poppler Poppler | =0.8.3 | |
Poppler Poppler | =0.7.0 | |
Poppler Poppler | =0.7.2 | |
Poppler Poppler | =0.5.0 | |
Poppler Poppler | =0.8.6 | |
Poppler Poppler | =0.5.9 | |
Poppler Poppler | =0.5.90 | |
Poppler Poppler | =0.6.3 | |
Poppler Poppler | =0.2.0 | |
Poppler Poppler | =0.8.4 | |
Poppler Poppler | =0.5.4 | |
Poppler Poppler | =0.1.1 | |
Poppler Poppler | =0.9.0 | |
Poppler Poppler | =0.4.1 | |
Poppler Poppler | =0.5.3 | |
Poppler Poppler | <=0.10.5 | |
Poppler Poppler | =0.4.4 | |
Poppler Poppler | =0.8.7 | |
Poppler Poppler | =0.9.1 | |
Poppler Poppler | =0.3.0 | |
Poppler Poppler | =0.1 | |
Poppler Poppler | =0.6.2 | |
Poppler Poppler | =0.10.2 | |
Poppler Poppler | =0.4.3 | |
Poppler Poppler | =0.8.1 | |
Poppler Poppler | =0.5.1 | |
Poppler Poppler | =0.8.2 | |
redhat/xpdf | <1:3.00-22.el4_8.1 | 1:3.00-22.el4_8.1 |
redhat/gpdf | <0:2.8.2-7.7.2.el4_8.5 | 0:2.8.2-7.7.2.el4_8.5 |
redhat/kdegraphics | <7:3.3.1-15.el4_8.2 | 7:3.3.1-15.el4_8.2 |
redhat/poppler | <0:0.5.4-4.4.el5_3.9 | 0:0.5.4-4.4.el5_3.9 |
redhat/kdegraphics | <7:3.5.4-15.el5_4.2 | 7:3.5.4-15.el5_4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)