First published: Fri Oct 02 2009(Updated: )
Integer overflow was discovered in SplashBitmap::SplashBitmap when computing memory allocation requirements. This issue was previously reported as <a href="https://access.redhat.com/security/cve/CVE-2009-1188">CVE-2009-1188</a> / <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2009-1188 xpdf/poppler: SplashBitmap integer overflow" href="show_bug.cgi?id=495907">bug #495907</a> and addressed in poppler via gmalloc -> gmallocn change via: <a href="http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2">http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2</a> However, such fix is not sufficient, as overflow can occur even during rowSize calculation. Splash output device is not present in xpdf 2.x, it's also not in the xpdf code embedded in CUPS or tetex.
Affected Software | Affected Version | How to fix |
---|---|---|
freedesktop poppler | ||
Xpdf |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-526915 is classified as high due to the potential for an integer overflow leading to memory corruption.
To fix REDHAT-BUG-526915, update to the latest version of Freedesktop poppler or Xpdf that includes the patched code.
REDHAT-BUG-526915 affects systems using Freedesktop poppler and Xpdf versions that do not contain the remediation for this vulnerability.
The nature of the vulnerability in REDHAT-BUG-526915 is an integer overflow that occurs when computing memory allocation when processing bitmap images.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-526915, but it remains a serious concern due to its potential impact.