← Volver a CVEs
CVE-2009-0195
N/ADescripcion
Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado4/23/2009
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
apple:cupsfoolabs:xpdfglyphandcog:xpdfreader
Debilidades (CWE)
CWE-119
Referencias
http://rhn.redhat.com/errata/RHSA-2009-0458.html(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/34291(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/34481(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/34756(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/34963(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/35064(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/secunia_research/2009-17/(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/secunia_research/2009-18/(PSIRT-CNA@flexerasoftware.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087(PSIRT-CNA@flexerasoftware.com)
http://www.redhat.com/support/errata/RHSA-2009-0480.html(PSIRT-CNA@flexerasoftware.com)
http://www.securityfocus.com/archive/1/502759/100/0/threaded(PSIRT-CNA@flexerasoftware.com)
http://www.securityfocus.com/archive/1/502762/100/0/threaded(PSIRT-CNA@flexerasoftware.com)
http://www.securityfocus.com/bid/34791(PSIRT-CNA@flexerasoftware.com)
http://www.vupen.com/english/advisories/2010/1040(PSIRT-CNA@flexerasoftware.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10076(PSIRT-CNA@flexerasoftware.com)
http://rhn.redhat.com/errata/RHSA-2009-0458.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34291(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34481(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34756(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34963(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35064(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/secunia_research/2009-17/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/secunia_research/2009-18/(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2009-0480.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/502759/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/502762/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/34791(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1040(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10076(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.