ID CVE-2009-0147
Summary Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
References
Vulnerable Configurations
  • cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
    cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.7:a:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.7:a:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.91:a:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.91:a:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.91:b:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.91:b:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.91:c:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.91:c:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:a:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:a:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:b:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:b:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:c:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:c:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:d:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:d:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.92:e:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.92:e:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:0.93:a:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:0.93:a:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:2.02:pl1:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:2.02:pl1:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl1:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl1:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl2:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl2:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl3:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl3:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl4:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl4:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl5:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl5:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl6:*:*:*:*:*:*
    cpe:2.3:a:glyphandcog:xpdfreader:3.02:pl6:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:-:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 06-03-2019 - 16:30)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
oval via4
accepted 2013-04-29T04:23:29.292-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
family unix
id oval:org.mitre.oval:def:9941
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
version 30
redhat via4
advisories
  • rhsa
    id RHSA-2009:0429
  • rhsa
    id RHSA-2009:0430
  • rhsa
    id RHSA-2009:0431
  • rhsa
    id RHSA-2009:0458
  • rhsa
    id RHSA-2009:0480
rpms
  • cups-1:1.1.22-0.rc1.9.27.el4_7.5
  • cups-1:1.3.7-8.el5_3.4
  • cups-debuginfo-1:1.1.22-0.rc1.9.27.el4_7.5
  • cups-debuginfo-1:1.3.7-8.el5_3.4
  • cups-devel-1:1.1.22-0.rc1.9.27.el4_7.5
  • cups-devel-1:1.3.7-8.el5_3.4
  • cups-libs-1:1.1.22-0.rc1.9.27.el4_7.5
  • cups-libs-1:1.3.7-8.el5_3.4
  • cups-lpd-1:1.3.7-8.el5_3.4
  • xpdf-1:2.02-14.el3
  • xpdf-1:3.00-20.el4
  • xpdf-debuginfo-1:2.02-14.el3
  • xpdf-debuginfo-1:3.00-20.el4
  • kdegraphics-7:3.3.1-13.el4
  • kdegraphics-7:3.5.4-12.el5_3
  • kdegraphics-debuginfo-7:3.3.1-13.el4
  • kdegraphics-debuginfo-7:3.5.4-12.el5_3
  • kdegraphics-devel-7:3.3.1-13.el4
  • kdegraphics-devel-7:3.5.4-12.el5_3
  • gpdf-0:2.8.2-7.7.2.el4_7.4
  • gpdf-debuginfo-0:2.8.2-7.7.2.el4_7.4
  • poppler-0:0.5.4-4.4.el5_3.9
  • poppler-debuginfo-0:0.5.4-4.4.el5_3.9
  • poppler-devel-0:0.5.4-4.4.el5_3.9
  • poppler-utils-0:0.5.4-4.4.el5_3.9
  • tetex-0:2.0.2-22.0.1.EL4.16
  • tetex-afm-0:2.0.2-22.0.1.EL4.16
  • tetex-debuginfo-0:2.0.2-22.0.1.EL4.16
  • tetex-doc-0:2.0.2-22.0.1.EL4.16
  • tetex-dvips-0:2.0.2-22.0.1.EL4.16
  • tetex-fonts-0:2.0.2-22.0.1.EL4.16
  • tetex-latex-0:2.0.2-22.0.1.EL4.16
  • tetex-xdvi-0:2.0.2-22.0.1.EL4.16
  • tetex-0:3.0-33.8.el5_5.5
  • tetex-afm-0:3.0-33.8.el5_5.5
  • tetex-debuginfo-0:3.0-33.8.el5_5.5
  • tetex-doc-0:3.0-33.8.el5_5.5
  • tetex-dvips-0:3.0-33.8.el5_5.5
  • tetex-fonts-0:3.0-33.8.el5_5.5
  • tetex-latex-0:3.0-33.8.el5_5.5
  • tetex-xdvi-0:3.0-33.8.el5_5.5
refmap via4
apple
  • APPLE-SA-2009-05-12
  • APPLE-SA-2009-06-17-1
bid 34568
bugtraq
  • 20090417 rPSA-2009-0059-1 poppler
  • 20090417 rPSA-2009-0061-1 cups
cert TA09-133A
confirm
debian
  • DSA-1790
  • DSA-1793
fedora
  • FEDORA-2009-6972
  • FEDORA-2009-6973
  • FEDORA-2009-6982
gentoo GLSA-200904-20
mandriva
  • MDVSA-2009:101
  • MDVSA-2010:087
sectrack 1022073
secunia
  • 34291
  • 34481
  • 34755
  • 34756
  • 34852
  • 34959
  • 34963
  • 34991
  • 35037
  • 35064
  • 35065
  • 35074
  • 35618
  • 35685
slackware SSA:2009-129-01
suse
  • SUSE-SA:2009:024
  • SUSE-SR:2009:010
  • SUSE-SR:2009:012
vupen
  • ADV-2009-1065
  • ADV-2009-1066
  • ADV-2009-1077
  • ADV-2009-1297
  • ADV-2009-1621
  • ADV-2010-1040
Last major update 06-03-2019 - 16:30
Published 23-04-2009 - 17:30
Last modified 06-03-2019 - 16:30
Back to Top