CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
90.6%
Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
Vendor | Product | Version | CPE |
---|---|---|---|
foolabs | xpdf | 0.5a | cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:* |
foolabs | xpdf | 0.7a | cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:* |
foolabs | xpdf | 0.91a | cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:* |
foolabs | xpdf | 0.91b | cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:* |
foolabs | xpdf | 0.91c | cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:* |
foolabs | xpdf | 0.92a | cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:* |
foolabs | xpdf | 0.92b | cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:* |
foolabs | xpdf | 0.92c | cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:* |
foolabs | xpdf | 0.92d | cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:* |
foolabs | xpdf | 0.92e | cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:* |
bugs.gentoo.org/show_bug.cgi?id=263028
lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
lists.apple.com/archives/security-announce/2009/May/msg00002.html
lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
rhn.redhat.com/errata/RHSA-2009-0458.html
secunia.com/advisories/34291
secunia.com/advisories/34481
secunia.com/advisories/34755
secunia.com/advisories/34756
secunia.com/advisories/34852
secunia.com/advisories/34959
secunia.com/advisories/34963
secunia.com/advisories/34991
secunia.com/advisories/35037
secunia.com/advisories/35064
secunia.com/advisories/35065
secunia.com/advisories/35074
secunia.com/advisories/35618
secunia.com/advisories/35685
security.gentoo.org/glsa/glsa-200904-20.xml
slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477
support.apple.com/kb/HT3549
support.apple.com/kb/HT3639
wiki.rpath.com/Advisories:rPSA-2009-0059
wiki.rpath.com/Advisories:rPSA-2009-0061
www.debian.org/security/2009/dsa-1790
www.debian.org/security/2009/dsa-1793
www.mandriva.com/security/advisories?name=MDVSA-2009:101
www.mandriva.com/security/advisories?name=MDVSA-2010:087
www.redhat.com/support/errata/RHSA-2009-0429.html
www.redhat.com/support/errata/RHSA-2009-0430.html
www.redhat.com/support/errata/RHSA-2009-0431.html
www.redhat.com/support/errata/RHSA-2009-0480.html
www.securityfocus.com/archive/1/502750/100/0/threaded
www.securityfocus.com/archive/1/502761/100/0/threaded
www.securityfocus.com/bid/34568
www.securitytracker.com/id?1022073
www.us-cert.gov/cas/techalerts/TA09-133A.html
www.vupen.com/english/advisories/2009/1065
www.vupen.com/english/advisories/2009/1066
www.vupen.com/english/advisories/2009/1077
www.vupen.com/english/advisories/2009/1297
www.vupen.com/english/advisories/2009/1621
www.vupen.com/english/advisories/2010/1040
bugzilla.redhat.com/show_bug.cgi?id=490612
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9632
www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html