CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
96.6%
Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Vendor | Product | Version | CPE |
---|---|---|---|
poppler | poppler | 0.10.0 | cpe:/a:poppler:poppler:0.10.0::: |
poppler | poppler | 0.3.0 | cpe:/a:poppler:poppler:0.3.0::: |
poppler | poppler | 0.5.90 | cpe:/a:poppler:poppler:0.5.90::: |
poppler | poppler | 0.7.3 | cpe:/a:poppler:poppler:0.7.3::: |
poppler | poppler | 0.8.4 | cpe:/a:poppler:poppler:0.8.4::: |
poppler | poppler | 0.6.1 | cpe:/a:poppler:poppler:0.6.1::: |
poppler | poppler | 0.3.3 | cpe:/a:poppler:poppler:0.3.3::: |
poppler | poppler | 0.6.0 | cpe:/a:poppler:poppler:0.6.0::: |
poppler | poppler | 0.4.3 | cpe:/a:poppler:poppler:0.4.3::: |
poppler | poppler | 0.5.4 | cpe:/a:poppler:poppler:0.5.4::: |
bugs.gentoo.org/show_bug.cgi?id=263028#c16
lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
poppler.freedesktop.org/releases.html
secunia.com/advisories/34746
secunia.com/advisories/35064
secunia.com/advisories/35618
secunia.com/advisories/37028
secunia.com/advisories/37037
secunia.com/advisories/37043
secunia.com/advisories/37053
secunia.com/advisories/37077
secunia.com/advisories/37079
secunia.com/advisories/39327
secunia.com/advisories/39938
wiki.rpath.com/Advisories:rPSA-2009-0059
www.debian.org/security/2010/dsa-2028
www.debian.org/security/2010/dsa-2050
www.kb.cert.org/vuls/id/196617
www.mandriva.com/security/advisories?name=MDVSA-2010:087
www.mandriva.com/security/advisories?name=MDVSA-2011:175
www.redhat.com/support/errata/RHSA-2009-0480.html
www.securityfocus.com/archive/1/502761/100/0/threaded
www.securityfocus.com/bid/34568
www.vupen.com/english/advisories/2009/1076
www.vupen.com/english/advisories/2009/2928
www.vupen.com/english/advisories/2010/0802
www.vupen.com/english/advisories/2010/1040
www.vupen.com/english/advisories/2010/1220
bugs.launchpad.net/ubuntu/+source/poppler/+bug/361875
bugzilla.redhat.com/show_bug.cgi?id=495907
bugzilla.redhat.com/show_bug.cgi?id=526915
exchange.xforce.ibmcloud.com/vulnerabilities/50185
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9957
rhn.redhat.com/errata/RHSA-2009-1501.html
rhn.redhat.com/errata/RHSA-2009-1502.html
rhn.redhat.com/errata/RHSA-2009-1503.html
rhn.redhat.com/errata/RHSA-2009-1512.html
www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html