CVE-2009-0800
Summary
| CVE | CVE-2009-0800 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-04-23 17:30:01 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apple | Cups | 1.1 | All | All | All |
| Application | Apple | Cups | 1.1.1 | All | All | All |
| Application | Apple | Cups | 1.1.10 | All | All | All |
| Application | Apple | Cups | 1.1.10-1 | All | All | All |
| Application | Apple | Cups | 1.1.11 | All | All | All |
| Application | Apple | Cups | 1.1.12 | All | All | All |
| Application | Apple | Cups | 1.1.13 | All | All | All |
| Application | Apple | Cups | 1.1.14 | All | All | All |
| Application | Apple | Cups | 1.1.15 | All | All | All |
| Application | Apple | Cups | 1.1.16 | All | All | All |
| Application | Apple | Cups | 1.1.17 | All | All | All |
| Application | Apple | Cups | 1.1.18 | All | All | All |
| Application | Apple | Cups | 1.1.19 | All | All | All |
| Application | Apple | Cups | 1.1.19 | rc1 | All | All |
| Application | Apple | Cups | 1.1.19 | rc2 | All | All |
| Application | Apple | Cups | 1.1.19 | rc3 | All | All |
| Application | Apple | Cups | 1.1.19 | rc4 | All | All |
| Application | Apple | Cups | 1.1.19 | rc5 | All | All |
| Application | Apple | Cups | 1.1.2 | All | All | All |
| Application | Apple | Cups | 1.1.20 | All | All | All |
| Application | Apple | Cups | 1.1.20 | rc1 | All | All |
| Application | Apple | Cups | 1.1.20 | rc2 | All | All |
| Application | Apple | Cups | 1.1.20 | rc3 | All | All |
| Application | Apple | Cups | 1.1.20 | rc4 | All | All |
| Application | Apple | Cups | 1.1.20 | rc5 | All | All |
| Application | Apple | Cups | 1.1.20 | rc6 | All | All |
| Application | Apple | Cups | 1.1.21 | All | All | All |
| Application | Apple | Cups | 1.1.21 | rc1 | All | All |
| Application | Apple | Cups | 1.1.21 | rc2 | All | All |
| Application | Apple | Cups | 1.1.22 | All | All | All |
| Application | Apple | Cups | 1.1.22 | rc1 | All | All |
| Application | Apple | Cups | 1.1.22 | rc2 | All | All |
| Application | Apple | Cups | 1.1.23 | All | All | All |
| Application | Apple | Cups | 1.1.23 | rc1 | All | All |
| Application | Apple | Cups | 1.1.3 | All | All | All |
| Application | Apple | Cups | 1.1.4 | All | All | All |
| Application | Apple | Cups | 1.1.5 | All | All | All |
| Application | Apple | Cups | 1.1.5-1 | All | All | All |
| Application | Apple | Cups | 1.1.5-2 | All | All | All |
| Application | Apple | Cups | 1.1.6 | All | All | All |
| Application | Apple | Cups | 1.1.6-1 | All | All | All |
| Application | Apple | Cups | 1.1.6-2 | All | All | All |
| Application | Apple | Cups | 1.1.6-3 | All | All | All |
| Application | Apple | Cups | 1.1.7 | All | All | All |
| Application | Apple | Cups | 1.1.8 | All | All | All |
| Application | Apple | Cups | 1.1.9 | All | All | All |
| Application | Apple | Cups | 1.1.9-1 | All | All | All |
| Application | Apple | Cups | 1.2.0 | All | All | All |
| Application | Apple | Cups | 1.2.1 | All | All | All |
| Application | Apple | Cups | 1.2.10 | All | All | All |
| Application | Apple | Cups | 1.2.11 | All | All | All |
| Application | Apple | Cups | 1.2.12 | All | All | All |
| Application | Apple | Cups | 1.2.2 | All | All | All |
| Application | Apple | Cups | 1.2.3 | All | All | All |
| Application | Apple | Cups | 1.2.4 | All | All | All |
| Application | Apple | Cups | 1.2.5 | All | All | All |
| Application | Apple | Cups | 1.2.6 | All | All | All |
| Application | Apple | Cups | 1.2.7 | All | All | All |
| Application | Apple | Cups | 1.2.8 | All | All | All |
| Application | Apple | Cups | 1.2.9 | All | All | All |
| Application | Apple | Cups | 1.3.0 | All | All | All |
| Application | Apple | Cups | 1.3.1 | All | All | All |
| Application | Apple | Cups | 1.3.10 | All | All | All |
| Application | Apple | Cups | 1.3.11 | All | All | All |
| Application | Apple | Cups | 1.3.2 | All | All | All |
| Application | Apple | Cups | 1.3.3 | All | All | All |
| Application | Apple | Cups | 1.3.4 | All | All | All |
| Application | Apple | Cups | 1.3.5 | All | All | All |
| Application | Apple | Cups | 1.3.6 | All | All | All |
| Application | Apple | Cups | 1.3.7 | All | All | All |
| Application | Apple | Cups | 1.3.8 | All | All | All |
| Application | Apple | Cups | All | All | All | All |
| Application | Foolabs | Xpdf | 0.5a | All | All | All |
| Application | Foolabs | Xpdf | 0.7a | All | All | All |
| Application | Foolabs | Xpdf | 0.91a | All | All | All |
| Application | Foolabs | Xpdf | 0.91b | All | All | All |
| Application | Foolabs | Xpdf | 0.91c | All | All | All |
| Application | Foolabs | Xpdf | 0.92a | All | All | All |
| Application | Foolabs | Xpdf | 0.92b | All | All | All |
| Application | Foolabs | Xpdf | 0.92c | All | All | All |
| Application | Foolabs | Xpdf | 0.92d | All | All | All |
| Application | Foolabs | Xpdf | 0.92e | All | All | All |
| Application | Foolabs | Xpdf | 0.93a | All | All | All |
| Application | Foolabs | Xpdf | 0.93b | All | All | All |
| Application | Foolabs | Xpdf | 0.93c | All | All | All |
| Application | Foolabs | Xpdf | 1.00a | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.2 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.3 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.4 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.5 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.6 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.7 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.80 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.90 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.91 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.92 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.93 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.02 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.03 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | All | All | All | All |
| Application | Poppler | Poppler | 0.1 | All | All | All |
| Application | Poppler | Poppler | 0.1.1 | All | All | All |
| Application | Poppler | Poppler | 0.1.2 | All | All | All |
| Application | Poppler | Poppler | 0.10.0 | All | All | All |
| Application | Poppler | Poppler | 0.10.1 | All | All | All |
| Application | Poppler | Poppler | 0.10.2 | All | All | All |
| Application | Poppler | Poppler | 0.10.3 | All | All | All |
| Application | Poppler | Poppler | 0.10.4 | All | All | All |
| Application | Poppler | Poppler | 0.2.0 | All | All | All |
| Application | Poppler | Poppler | 0.3.0 | All | All | All |
| Application | Poppler | Poppler | 0.3.1 | All | All | All |
| Application | Poppler | Poppler | 0.3.2 | All | All | All |
| Application | Poppler | Poppler | 0.3.3 | All | All | All |
| Application | Poppler | Poppler | 0.4.0 | All | All | All |
| Application | Poppler | Poppler | 0.4.1 | All | All | All |
| Application | Poppler | Poppler | 0.4.2 | All | All | All |
| Application | Poppler | Poppler | 0.4.3 | All | All | All |
| Application | Poppler | Poppler | 0.4.4 | All | All | All |
| Application | Poppler | Poppler | 0.5.0 | All | All | All |
| Application | Poppler | Poppler | 0.5.1 | All | All | All |
| Application | Poppler | Poppler | 0.5.2 | All | All | All |
| Application | Poppler | Poppler | 0.5.3 | All | All | All |
| Application | Poppler | Poppler | 0.5.4 | All | All | All |
| Application | Poppler | Poppler | 0.5.9 | All | All | All |
| Application | Poppler | Poppler | 0.5.90 | All | All | All |
| Application | Poppler | Poppler | 0.5.91 | All | All | All |
| Application | Poppler | Poppler | 0.6.0 | All | All | All |
| Application | Poppler | Poppler | 0.6.1 | All | All | All |
| Application | Poppler | Poppler | 0.6.2 | All | All | All |
| Application | Poppler | Poppler | 0.6.3 | All | All | All |
| Application | Poppler | Poppler | 0.6.4 | All | All | All |
| Application | Poppler | Poppler | 0.7.0 | All | All | All |
| Application | Poppler | Poppler | 0.7.1 | All | All | All |
| Application | Poppler | Poppler | 0.7.2 | All | All | All |
| Application | Poppler | Poppler | 0.7.3 | All | All | All |
| Application | Poppler | Poppler | 0.8.0 | All | All | All |
| Application | Poppler | Poppler | 0.8.1 | All | All | All |
| Application | Poppler | Poppler | 0.8.2 | All | All | All |
| Application | Poppler | Poppler | 0.8.3 | All | All | All |
| Application | Poppler | Poppler | 0.8.4 | All | All | All |
| Application | Poppler | Poppler | 0.8.5 | All | All | All |
| Application | Poppler | Poppler | 0.8.6 | All | All | All |
| Application | Poppler | Poppler | 0.8.7 | All | All | All |
| Application | Poppler | Poppler | 0.9.0 | All | All | All |
| Application | Poppler | Poppler | 0.9.1 | All | All | All |
| Application | Poppler | Poppler | 0.9.2 | All | All | All |
| Application | Poppler | Poppler | 0.9.3 | All | All | All |
| Application | Poppler | Poppler | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SUSE Update for Multiple Packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Xpdf JBIG2 Processing Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [SECURITY] Fedora 9 Update: poppler-0.8.7-2.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Xpdf JBIG2 Processing Multiple Security Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Poppler Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| 495887 – (CVE-2009-0800) CVE-2009-0800 PDF JBIG2 multiple input validation flaws | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | |
| Support / Security / Advisories / / MDVSA-2009:101 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| [security-announce] SUSE Security Announcement: cups (SUSE-SA:2009:024) | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Slackware update for xpdf - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:010 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Poppler | af854a3a-2127-422b-91ae-364da2661108 | poppler.freedesktop.org | |
| SUSE update for cups - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [SECURITY] Fedora 10 Update: poppler-0.8.7-6.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Support / Security / Advisories / / MDVSA-2011:175 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Debian -- Security Information -- DSA-1793-1 kdegraphics | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| CUPS Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2010:087 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Red Hat update for gpdf - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for xpdf - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for poppler - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Fedora update for poppler - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| US-CERT Vulnerability Note VU#196617 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| access.redhat.com | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| [SECURITY] Fedora 11 Update: poppler-0.10.7-2.fc11 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Debian update for xpdf - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Debian -- Security Information -- DSA-1790-1 xpdf | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Debian update for kdegraphics - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Red Hat update for cups - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:012 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Xpdf Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| access.redhat.com | CVE-2009-0800 | MITRE | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.