First published: Wed Apr 15 2009(Updated: )
Multiple input validation flaws were discovered in xpdf's JBIG2 decoder. These flaws could lead to arbitrary code execute with the permissions of the user running xpdf. Will Dormann of the CERT/CC created the extensive testsuite for the JBIG2 decoder in various PDF libraries that found this flaw. Acknowledgements: Red Hat would like to thank Will Dormann of the CERT/CC for responsibly reporting these flaws.
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-495887 is considered high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-495887, update to the latest version of xpdf that addresses the input validation flaws.
All versions of xpdf prior to the patched versions containing fix for REDHAT-BUG-495887 are affected.
REDHAT-BUG-495887 encompasses input validation flaws specifically in xpdf's JBIG2 decoder.
REDHAT-BUG-495887 was discovered by Will Dormann from the CERT/CC through extensive testing of PDF libraries.