CVE-2009-1182
Summary
| CVE | CVE-2009-1182 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-04-23 17:30:01 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apple | Cups | 1.1 | All | All | All |
| Application | Apple | Cups | 1.1.1 | All | All | All |
| Application | Apple | Cups | 1.1.10 | All | All | All |
| Application | Apple | Cups | 1.1.10-1 | All | All | All |
| Application | Apple | Cups | 1.1.11 | All | All | All |
| Application | Apple | Cups | 1.1.12 | All | All | All |
| Application | Apple | Cups | 1.1.13 | All | All | All |
| Application | Apple | Cups | 1.1.14 | All | All | All |
| Application | Apple | Cups | 1.1.15 | All | All | All |
| Application | Apple | Cups | 1.1.16 | All | All | All |
| Application | Apple | Cups | 1.1.17 | All | All | All |
| Application | Apple | Cups | 1.1.18 | All | All | All |
| Application | Apple | Cups | 1.1.19 | All | All | All |
| Application | Apple | Cups | 1.1.19 | rc1 | All | All |
| Application | Apple | Cups | 1.1.19 | rc2 | All | All |
| Application | Apple | Cups | 1.1.19 | rc3 | All | All |
| Application | Apple | Cups | 1.1.19 | rc4 | All | All |
| Application | Apple | Cups | 1.1.19 | rc5 | All | All |
| Application | Apple | Cups | 1.1.2 | All | All | All |
| Application | Apple | Cups | 1.1.20 | All | All | All |
| Application | Apple | Cups | 1.1.20 | rc1 | All | All |
| Application | Apple | Cups | 1.1.20 | rc2 | All | All |
| Application | Apple | Cups | 1.1.20 | rc3 | All | All |
| Application | Apple | Cups | 1.1.20 | rc4 | All | All |
| Application | Apple | Cups | 1.1.20 | rc5 | All | All |
| Application | Apple | Cups | 1.1.20 | rc6 | All | All |
| Application | Apple | Cups | 1.1.21 | All | All | All |
| Application | Apple | Cups | 1.1.21 | rc1 | All | All |
| Application | Apple | Cups | 1.1.21 | rc2 | All | All |
| Application | Apple | Cups | 1.1.22 | All | All | All |
| Application | Apple | Cups | 1.1.22 | rc1 | All | All |
| Application | Apple | Cups | 1.1.22 | rc2 | All | All |
| Application | Apple | Cups | 1.1.23 | All | All | All |
| Application | Apple | Cups | 1.1.23 | rc1 | All | All |
| Application | Apple | Cups | 1.1.3 | All | All | All |
| Application | Apple | Cups | 1.1.4 | All | All | All |
| Application | Apple | Cups | 1.1.5 | All | All | All |
| Application | Apple | Cups | 1.1.5-1 | All | All | All |
| Application | Apple | Cups | 1.1.5-2 | All | All | All |
| Application | Apple | Cups | 1.1.6 | All | All | All |
| Application | Apple | Cups | 1.1.6-1 | All | All | All |
| Application | Apple | Cups | 1.1.6-2 | All | All | All |
| Application | Apple | Cups | 1.1.6-3 | All | All | All |
| Application | Apple | Cups | 1.1.7 | All | All | All |
| Application | Apple | Cups | 1.1.8 | All | All | All |
| Application | Apple | Cups | 1.1.9 | All | All | All |
| Application | Apple | Cups | 1.1.9-1 | All | All | All |
| Application | Apple | Cups | 1.2.0 | All | All | All |
| Application | Apple | Cups | 1.2.1 | All | All | All |
| Application | Apple | Cups | 1.2.10 | All | All | All |
| Application | Apple | Cups | 1.2.11 | All | All | All |
| Application | Apple | Cups | 1.2.12 | All | All | All |
| Application | Apple | Cups | 1.2.2 | All | All | All |
| Application | Apple | Cups | 1.2.3 | All | All | All |
| Application | Apple | Cups | 1.2.4 | All | All | All |
| Application | Apple | Cups | 1.2.5 | All | All | All |
| Application | Apple | Cups | 1.2.6 | All | All | All |
| Application | Apple | Cups | 1.2.7 | All | All | All |
| Application | Apple | Cups | 1.2.8 | All | All | All |
| Application | Apple | Cups | 1.2.9 | All | All | All |
| Application | Apple | Cups | 1.3.0 | All | All | All |
| Application | Apple | Cups | 1.3.1 | All | All | All |
| Application | Apple | Cups | 1.3.10 | All | All | All |
| Application | Apple | Cups | 1.3.11 | All | All | All |
| Application | Apple | Cups | 1.3.2 | All | All | All |
| Application | Apple | Cups | 1.3.3 | All | All | All |
| Application | Apple | Cups | 1.3.4 | All | All | All |
| Application | Apple | Cups | 1.3.5 | All | All | All |
| Application | Apple | Cups | 1.3.6 | All | All | All |
| Application | Apple | Cups | 1.3.7 | All | All | All |
| Application | Apple | Cups | 1.3.8 | All | All | All |
| Application | Apple | Cups | All | All | All | All |
| Application | Foolabs | Xpdf | 0.5a | All | All | All |
| Application | Foolabs | Xpdf | 0.7a | All | All | All |
| Application | Foolabs | Xpdf | 0.91a | All | All | All |
| Application | Foolabs | Xpdf | 0.91b | All | All | All |
| Application | Foolabs | Xpdf | 0.91c | All | All | All |
| Application | Foolabs | Xpdf | 0.92a | All | All | All |
| Application | Foolabs | Xpdf | 0.92b | All | All | All |
| Application | Foolabs | Xpdf | 0.92c | All | All | All |
| Application | Foolabs | Xpdf | 0.92d | All | All | All |
| Application | Foolabs | Xpdf | 0.92e | All | All | All |
| Application | Foolabs | Xpdf | 0.93a | All | All | All |
| Application | Foolabs | Xpdf | 0.93b | All | All | All |
| Application | Foolabs | Xpdf | 0.93c | All | All | All |
| Application | Foolabs | Xpdf | 1.00a | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.2 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.3 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.4 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.5 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.6 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.7 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.80 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.90 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.91 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.92 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 0.93 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 1.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.02 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 2.03 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.00 | All | All | All |
| Application | Glyphandcog | Xpdfreader | 3.01 | All | All | All |
| Application | Glyphandcog | Xpdfreader | All | All | All | All |
| Application | Poppler | Poppler | 0.1 | All | All | All |
| Application | Poppler | Poppler | 0.1.1 | All | All | All |
| Application | Poppler | Poppler | 0.1.2 | All | All | All |
| Application | Poppler | Poppler | 0.10.0 | All | All | All |
| Application | Poppler | Poppler | 0.10.1 | All | All | All |
| Application | Poppler | Poppler | 0.10.2 | All | All | All |
| Application | Poppler | Poppler | 0.10.3 | All | All | All |
| Application | Poppler | Poppler | 0.10.4 | All | All | All |
| Application | Poppler | Poppler | 0.2.0 | All | All | All |
| Application | Poppler | Poppler | 0.3.0 | All | All | All |
| Application | Poppler | Poppler | 0.3.1 | All | All | All |
| Application | Poppler | Poppler | 0.3.2 | All | All | All |
| Application | Poppler | Poppler | 0.3.3 | All | All | All |
| Application | Poppler | Poppler | 0.4.0 | All | All | All |
| Application | Poppler | Poppler | 0.4.1 | All | All | All |
| Application | Poppler | Poppler | 0.4.2 | All | All | All |
| Application | Poppler | Poppler | 0.4.3 | All | All | All |
| Application | Poppler | Poppler | 0.4.4 | All | All | All |
| Application | Poppler | Poppler | 0.5.0 | All | All | All |
| Application | Poppler | Poppler | 0.5.1 | All | All | All |
| Application | Poppler | Poppler | 0.5.2 | All | All | All |
| Application | Poppler | Poppler | 0.5.3 | All | All | All |
| Application | Poppler | Poppler | 0.5.4 | All | All | All |
| Application | Poppler | Poppler | 0.5.9 | All | All | All |
| Application | Poppler | Poppler | 0.5.90 | All | All | All |
| Application | Poppler | Poppler | 0.5.91 | All | All | All |
| Application | Poppler | Poppler | 0.6.0 | All | All | All |
| Application | Poppler | Poppler | 0.6.1 | All | All | All |
| Application | Poppler | Poppler | 0.6.2 | All | All | All |
| Application | Poppler | Poppler | 0.6.3 | All | All | All |
| Application | Poppler | Poppler | 0.6.4 | All | All | All |
| Application | Poppler | Poppler | 0.7.0 | All | All | All |
| Application | Poppler | Poppler | 0.7.1 | All | All | All |
| Application | Poppler | Poppler | 0.7.2 | All | All | All |
| Application | Poppler | Poppler | 0.7.3 | All | All | All |
| Application | Poppler | Poppler | 0.8.0 | All | All | All |
| Application | Poppler | Poppler | 0.8.1 | All | All | All |
| Application | Poppler | Poppler | 0.8.2 | All | All | All |
| Application | Poppler | Poppler | 0.8.3 | All | All | All |
| Application | Poppler | Poppler | 0.8.4 | All | All | All |
| Application | Poppler | Poppler | 0.8.5 | All | All | All |
| Application | Poppler | Poppler | 0.8.6 | All | All | All |
| Application | Poppler | Poppler | 0.8.7 | All | All | All |
| Application | Poppler | Poppler | 0.9.0 | All | All | All |
| Application | Poppler | Poppler | 0.9.1 | All | All | All |
| Application | Poppler | Poppler | 0.9.2 | All | All | All |
| Application | Poppler | Poppler | 0.9.3 | All | All | All |
| Application | Poppler | Poppler | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SUSE Update for Multiple Packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Xpdf JBIG2 Processing Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [SECURITY] Fedora 9 Update: poppler-0.8.7-2.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Xpdf JBIG2 Processing Multiple Security Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Poppler Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2009:101 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| [security-announce] SUSE Security Announcement: cups (SUSE-SA:2009:024) | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Slackware update for xpdf - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:010 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Poppler | af854a3a-2127-422b-91ae-364da2661108 | poppler.freedesktop.org | |
| SUSE update for cups - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [SECURITY] Fedora 10 Update: poppler-0.8.7-6.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Support / Security / Advisories / / MDVSA-2011:175 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Debian -- Security Information -- DSA-1793-1 kdegraphics | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| CUPS Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2010:087 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Red Hat update for gpdf - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for xpdf - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for poppler - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Fedora update for poppler - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| US-CERT Vulnerability Note VU#196617 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| access.redhat.com | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| [SECURITY] Fedora 11 Update: poppler-0.10.7-2.fc11 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Debian update for xpdf - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Debian -- Security Information -- DSA-1790-1 xpdf | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Debian update for kdegraphics - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for cups - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:012 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Xpdf Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| 495896 – (CVE-2009-1182) CVE-2009-1182 PDF JBIG2 MMR decoder buffer overflows | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.