First published: Thu Oct 15 2009(Updated: )
GPdf is a viewer for Portable Document Format (PDF) files.<br>Multiple integer overflow flaws were found in GPdf. An attacker could<br>create a malicious PDF file that would cause GPdf to crash or, potentially,<br>execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,<br>CVE-2009-3604, CVE-2009-3608, CVE-2009-3609)<br>Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604<br>issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.<br>Users are advised to upgrade to this updated package, which contains a<br>backported patch to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gpdf | <2.8.2-7.7.2.el4_8.5 | 2.8.2-7.7.2.el4_8.5 |
redhat/gpdf | <2.8.2-7.7.2.el4_8.5 | 2.8.2-7.7.2.el4_8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:1503 is classified as critical due to the potential for arbitrary code execution.
To fix RHSA-2009:1503, you should update the GPdf package to version 2.8.2-7.7.2.el4_8.5.
RHSA-2009:1503 addresses multiple integer overflow vulnerabilities, including CVE-2009-0791 and CVE-2009-1188.
Users of GPdf versions prior to 2.8.2-7.7.2.el4_8.5 are at risk from the vulnerabilities outlined in RHSA-2009:1503.
Yes, RHSA-2009:1503 can potentially lead to system compromise through execution of arbitrary code.