← Volver a CVEs
CVE-2009-0166
N/ADescripcion
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado4/23/2009
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
apple:cupsfoolabs:xpdfglyphandcog:xpdfreaderpoppler:poppler
Debilidades (CWE)
CWE-399
Referencias
http://rhn.redhat.com/errata/RHSA-2009-0458.html(cve@mitre.org)
http://secunia.com/advisories/34291(cve@mitre.org)
http://secunia.com/advisories/34481(cve@mitre.org)
http://secunia.com/advisories/34755(cve@mitre.org)
http://secunia.com/advisories/34756(cve@mitre.org)
http://secunia.com/advisories/34852(cve@mitre.org)
http://secunia.com/advisories/34959(cve@mitre.org)
http://secunia.com/advisories/34963(cve@mitre.org)
http://secunia.com/advisories/34991(cve@mitre.org)
http://secunia.com/advisories/35037(cve@mitre.org)
http://secunia.com/advisories/35064(cve@mitre.org)
http://secunia.com/advisories/35065(cve@mitre.org)
http://secunia.com/advisories/35618(cve@mitre.org)
http://secunia.com/advisories/35685(cve@mitre.org)
http://security.gentoo.org/glsa/glsa-200904-20.xml(cve@mitre.org)
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477(cve@mitre.org)
http://wiki.rpath.com/Advisories:rPSA-2009-0061(cve@mitre.org)
http://www.debian.org/security/2009/dsa-1790(cve@mitre.org)
http://www.debian.org/security/2009/dsa-1793(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2009-0429.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2009-0430.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2009-0431.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2009-0480.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/502750/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/34568(cve@mitre.org)
http://www.securitytracker.com/id?1022073(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1065(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1066(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1077(cve@mitre.org)
http://www.vupen.com/english/advisories/2010/1040(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=490625(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2009-0458.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34291(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34481(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34755(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34756(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34852(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34959(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34963(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34991(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35037(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35064(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35065(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35618(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35685(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200904-20.xml(af854a3a-2127-422b-91ae-364da2661108)
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477(af854a3a-2127-422b-91ae-364da2661108)
http://wiki.rpath.com/Advisories:rPSA-2009-0061(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2009/dsa-1790(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2009/dsa-1793(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2009:101(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0429.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0430.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0431.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0480.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/502750/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/34568(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1022073(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1065(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1066(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1077(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1040(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=490625(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.