First published: Thu Apr 16 2009(Updated: )
Xpdf is an X Window System based viewer for Portable Document Format (PDF)<br>files.<br>Multiple integer overflow flaws were found in Xpdf's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause Xpdf to crash<br>or, potentially, execute arbitrary code when opened. (CVE-2009-0147,<br>CVE-2009-1179)<br>Multiple buffer overflow flaws were found in Xpdf's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause Xpdf to crash<br>or, potentially, execute arbitrary code when opened. (CVE-2009-0146,<br>CVE-2009-1182)<br>Multiple flaws were found in Xpdf's JBIG2 decoder that could lead to the<br>freeing of arbitrary memory. An attacker could create a malicious PDF file<br>that would cause Xpdf to crash or, potentially, execute arbitrary code when<br>opened. (CVE-2009-0166, CVE-2009-1180)<br>Multiple input validation flaws were found in Xpdf's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause Xpdf to crash<br>or, potentially, execute arbitrary code when opened. (CVE-2009-0800)<br>Multiple denial of service flaws were found in Xpdf's JBIG2 decoder. An<br>attacker could create a malicious PDF that would cause Xpdf to crash when<br>opened. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183)<br>Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product<br>Security team, and Will Dormann of the CERT/CC for responsibly reporting<br>these flaws.<br>Users are advised to upgrade to this updated package, which contains<br>backported patches to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xpdf | <3.00-20.el4 | 3.00-20.el4 |
redhat/xpdf | <3.00-20.el4 | 3.00-20.el4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.