ID CVE-2009-3606
Summary Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
    cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 13-02-2023 - 02:20)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-04-29T04:12:56.458-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    family unix
    id oval:org.mitre.oval:def:11289
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    version 30
  • accepted 2010-06-07T04:00:52.575-04:00
    class vulnerability
    contributors
    name Pai Peng
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    family unix
    id oval:org.mitre.oval:def:7836
    status accepted
    submitted 2010-03-22T14:26:56.000-04:00
    title Multiple Security Vulnerabilities in the Solaris GNOME PDF Rendering Libraries May Lead to a Denial of Service (DoS) or Execution of Arbitrary Code
    version 36
redhat via4
advisories
  • bugzilla
    id 526877
    title CVE-2009-3606 xpdf/poppler: PSOutputDev::doImageL1Sep integer overflow
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • comment gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4
        oval oval:com.redhat.rhsa:tst:20090458001
      • comment gpdf is signed with Red Hat master key
        oval oval:com.redhat.rhsa:tst:20060177002
    rhsa
    id RHSA-2009:0458
    released 2009-04-30
    severity Important
    title RHSA-2009:0458: gpdf security update (Important)
  • bugzilla
    id 526911
    title CVE-2009-3604 xpdf/poppler: Splash::drawImage integer overflow and missing allocation return value check
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment poppler is earlier than 0:0.5.4-4.4.el5_3.9
            oval oval:com.redhat.rhsa:tst:20090480001
          • comment poppler is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070732002
        • AND
          • comment poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9
            oval oval:com.redhat.rhsa:tst:20090480003
          • comment poppler-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070732004
        • AND
          • comment poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9
            oval oval:com.redhat.rhsa:tst:20090480005
          • comment poppler-utils is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070732006
    rhsa
    id RHSA-2009:0480
    released 2009-05-13
    severity Important
    title RHSA-2009:0480: poppler security update (Important)
  • rhsa
    id RHSA-2009:1500
  • rhsa
    id RHSA-2009:1501
  • rhsa
    id RHSA-2009:1502
rpms
  • gpdf-0:2.8.2-7.7.2.el4_7.4
  • gpdf-debuginfo-0:2.8.2-7.7.2.el4_7.4
  • poppler-0:0.5.4-4.4.el5_3.9
  • poppler-debuginfo-0:0.5.4-4.4.el5_3.9
  • poppler-devel-0:0.5.4-4.4.el5_3.9
  • poppler-utils-0:0.5.4-4.4.el5_3.9
  • xpdf-1:2.02-17.el3
  • xpdf-debuginfo-1:2.02-17.el3
  • xpdf-1:3.00-22.el4_8.1
  • xpdf-debuginfo-1:3.00-22.el4_8.1
  • kdegraphics-7:3.5.4-15.el5_4.2
  • kdegraphics-debuginfo-7:3.5.4-15.el5_4.2
  • kdegraphics-devel-7:3.5.4-15.el5_4.2
refmap via4
bid 36703
confirm
debian
  • DSA-1941
  • DSA-2028
  • DSA-2050
fedora
  • FEDORA-2009-10823
  • FEDORA-2009-10845
  • FEDORA-2010-1377
  • FEDORA-2010-1805
  • FEDORA-2010-1842
mandriva
  • MDVSA-2009:287
  • MDVSA-2010:087
  • MDVSA-2011:175
mlist
  • [oss-security] 20091130 Need more information on recent poppler issues
  • [oss-security] 20091130 Re: Need more information on recent poppler issues
  • [oss-security] 20091201 Re: Need more information on recent poppler issues
sectrack 1023029
secunia
  • 37023
  • 37037
  • 37042
  • 37043
  • 37053
  • 37077
  • 37159
  • 39327
  • 39938
sunalert
  • 1021706
  • 274030
suse SUSE-SR:2009:018
vupen
  • ADV-2009-2924
  • ADV-2009-2928
  • ADV-2010-0802
  • ADV-2010-1040
  • ADV-2010-1220
xf xpdf-psoutputdev-bo(53798)
Last major update 13-02-2023 - 02:20
Published 21-10-2009 - 17:30
Last modified 13-02-2023 - 02:20
Back to Top