TROYANOSYVIRUS
Volver a CVEs

CVE-2009-3609

N/A

Descripcion

Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado10/21/2009
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

foolabs:xpdfglyph_and_cog:pdftopsglyphandcog:xpdfreadergnome:gpdfkde:kpdfpoppler:poppler

Debilidades (CWE)

CWE-189

Referencias

http://poppler.freedesktop.org/(secalert@redhat.com)
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch(af854a3a-2127-422b-91ae-364da2661108)
http://poppler.freedesktop.org/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37023(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37028(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37034(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37037(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37043(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37051(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37054(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37061(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37077(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37079(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37114(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37159(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39327(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39938(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1023029(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2028(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2050(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0755.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36703(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-850-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-850-3(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2924(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2925(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2926(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/2928(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/0802(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1220(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=526893(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1500.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1501.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1502.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1503.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1504.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1512.html(af854a3a-2127-422b-91ae-364da2661108)
https://rhn.redhat.com/errata/RHSA-2009-1513.html(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.