First published: Wed May 13 2009(Updated: )
Poppler is a Portable Document Format (PDF) rendering library, used by<br>applications such as Evince.<br>Multiple integer overflow flaws were found in poppler. An attacker could<br>create a malicious PDF file that would cause applications that use poppler<br>(such as Evince) to crash or, potentially, execute arbitrary code when<br>opened. (CVE-2009-0147, CVE-2009-1179, CVE-2009-1187, CVE-2009-1188)<br>Multiple buffer overflow flaws were found in poppler's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause applications<br>that use poppler (such as Evince) to crash or, potentially, execute<br>arbitrary code when opened. (CVE-2009-0146, CVE-2009-1182)<br>Multiple flaws were found in poppler's JBIG2 decoder that could lead to the<br>freeing of arbitrary memory. An attacker could create a malicious PDF file<br>that would cause applications that use poppler (such as Evince) to crash<br>or, potentially, execute arbitrary code when opened. (CVE-2009-0166,<br>CVE-2009-1180)<br>Multiple input validation flaws were found in poppler's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause applications<br>that use poppler (such as Evince) to crash or, potentially, execute<br>arbitrary code when opened. (CVE-2009-0800)<br>Multiple denial of service flaws were found in poppler's JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause applications<br>that use poppler (such as Evince) to crash when opened. (CVE-2009-0799,<br>CVE-2009-1181, CVE-2009-1183)<br>Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product<br>Security team, and Will Dormann of the CERT/CC for responsibly reporting<br>these flaws.<br>Users are advised to upgrade to these updated packages, which contain<br>backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/poppler | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
redhat/poppler | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
redhat/poppler-devel | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
redhat/poppler-devel | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
redhat/poppler-utils | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
redhat/poppler-utils | <0.5.4-4.4.el5_3.9 | 0.5.4-4.4.el5_3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.