CVE-2009-0195
Summary
| CVE | CVE-2009-0195 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-04-23 17:30:00 UTC |
| Updated | 2019-03-06 16:30:00 UTC |
| Description | Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apple | Cups | 1.3.9 | All | All | All |
| Application | Apple | Cups | 1.3.9 | All | All | All |
| Application | Foolabs | Xpdf | 0.5a | All | All | All |
| Application | Foolabs | Xpdf | 0.7a | All | All | All |
| Application | Foolabs | Xpdf | 0.91a | All | All | All |
| Application | Foolabs | Xpdf | 0.91b | All | All | All |
| Application | Foolabs | Xpdf | 0.91c | All | All | All |
| Application | Foolabs | Xpdf | 0.92a | All | All | All |
| Application | Foolabs | Xpdf | 0.92b | All | All | All |
| Application | Foolabs | Xpdf | 0.92c | All | All | All |
| Application | Foolabs | Xpdf | 0.92d | All | All | All |
| Application | Foolabs | Xpdf | 0.92e | All | All | All |
| Application | Foolabs | Xpdf | 0.93a | All | All | All |
| Application | Foolabs | Xpdf | 0.93b | All | All | All |
| Application | Foolabs | Xpdf | 0.93c | All | All | All |
| Application | Foolabs | Xpdf | 1.00a | All | All | All |
| Application | Foolabs | Xpdf | 3.0.1 | All | All | All |
| Application | Foolabs | Xpdf | 0.5a | All | All | All |
| Application | Foolabs | Xpdf | 0.7a | All | All | All |
| Application | Foolabs | Xpdf | 0.91a | All | All | All |
| Application | Foolabs | Xpdf | 0.91b | All | All | All |
| Application | Foolabs | Xpdf | 0.91c | All | All | All |
| Application | Foolabs | Xpdf | 0.92a | All | All | All |
| Application | Foolabs | Xpdf | 0.92b | All | All | All |
| Application | Foolabs | Xpdf | 0.92c | All | All | All |
| Application | Foolabs | Xpdf | 0.92d | All | All | All |
| Application | Foolabs | Xpdf | 0.92e | All | All | All |
| Application | Foolabs | Xpdf | 0.93a | All | All | All |
| Application | Foolabs | Xpdf | 0.93b | All | All | All |
| Application | Foolabs | Xpdf | 0.93c | All | All | All |
| Application | Foolabs | Xpdf | 1.00a | All | All | All |
| Application | Foolabs | Xpdf | 3.0.1 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.2 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.3 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.4 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.5 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.6 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.7 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.80 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.90 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.91 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.92 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.93 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.02 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.03 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.2 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.3 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.4 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.5 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.6 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.7 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.80 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.90 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.91 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.92 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.93 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.02 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.03 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat update for cups - Secunia.com | SECUNIA | secunia.com | |
| Red Hat update for gpdf - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| Support / Security / Advisories / / MDVSA-2010:087 | Mandriva | MANDRIVA | www.mandriva.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Support | REDHAT | www.redhat.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| CUPS Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| access.redhat.com | REDHAT | rhn.redhat.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Xpdf JBIG2 Processing Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| CUPS and Xpdf JBIG2 Symbol Dictionary Processing Heap Buffer Overflow Vulnerability | BID | www.securityfocus.com | |
| About Secunia Research | Flexera | MISC | secunia.com | Vendor Advisory |
| Red Hat update for poppler - Secunia.com | SECUNIA | secunia.com | |
| Research - Community | MISC | secunia.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.