cpe:/a:apple:cups:1.1 cpe:/a:apple:cups:1.1.1 cpe:/a:apple:cups:1.1.2 cpe:/a:apple:cups:1.1.3 cpe:/a:apple:cups:1.1.4 cpe:/a:apple:cups:1.1.5 cpe:/a:apple:cups:1.1.5-1 cpe:/a:apple:cups:1.1.5-2 cpe:/a:apple:cups:1.1.6 cpe:/a:apple:cups:1.1.6-1 cpe:/a:apple:cups:1.1.6-2 cpe:/a:apple:cups:1.1.6-3 cpe:/a:apple:cups:1.1.7 cpe:/a:apple:cups:1.1.8 cpe:/a:apple:cups:1.1.9 cpe:/a:apple:cups:1.1.9-1 cpe:/a:apple:cups:1.1.10 cpe:/a:apple:cups:1.1.10-1 cpe:/a:apple:cups:1.1.11 cpe:/a:apple:cups:1.1.12 cpe:/a:apple:cups:1.1.13 cpe:/a:apple:cups:1.1.14 cpe:/a:apple:cups:1.1.15 cpe:/a:apple:cups:1.1.16 cpe:/a:apple:cups:1.1.17 cpe:/a:apple:cups:1.1.18 cpe:/a:apple:cups:1.1.19 cpe:/a:apple:cups:1.1.19:rc1 cpe:/a:apple:cups:1.1.19:rc2 cpe:/a:apple:cups:1.1.19:rc3 cpe:/a:apple:cups:1.1.19:rc4 cpe:/a:apple:cups:1.1.19:rc5 cpe:/a:apple:cups:1.1.20 cpe:/a:apple:cups:1.1.20:rc1 cpe:/a:apple:cups:1.1.20:rc2 cpe:/a:apple:cups:1.1.20:rc3 cpe:/a:apple:cups:1.1.20:rc4 cpe:/a:apple:cups:1.1.20:rc5 cpe:/a:apple:cups:1.1.20:rc6 cpe:/a:apple:cups:1.1.21 cpe:/a:apple:cups:1.1.21:rc1 cpe:/a:apple:cups:1.1.21:rc2 cpe:/a:apple:cups:1.1.22 cpe:/a:apple:cups:1.1.22:rc1 cpe:/a:apple:cups:1.1.22:rc2 cpe:/a:apple:cups:1.1.23 cpe:/a:apple:cups:1.1.23:rc1 cpe:/a:apple:cups:1.2.0 cpe:/a:apple:cups:1.2.1 cpe:/a:apple:cups:1.2.2 cpe:/a:apple:cups:1.2.3 cpe:/a:apple:cups:1.2.4 cpe:/a:apple:cups:1.2.5 cpe:/a:apple:cups:1.2.6 cpe:/a:apple:cups:1.2.7 cpe:/a:apple:cups:1.2.8 cpe:/a:apple:cups:1.2.9 cpe:/a:apple:cups:1.2.10 cpe:/a:apple:cups:1.2.11 cpe:/a:apple:cups:1.2.12 cpe:/a:apple:cups:1.3.0 cpe:/a:apple:cups:1.3.1 cpe:/a:apple:cups:1.3.2 cpe:/a:apple:cups:1.3.3 cpe:/a:apple:cups:1.3.4 cpe:/a:apple:cups:1.3.5 cpe:/a:apple:cups:1.3.6 cpe:/a:apple:cups:1.3.7 cpe:/a:apple:cups:1.3.8 cpe:/a:apple:cups:1.3.9 cpe:/a:apple:cups:1.3.10 cpe:/a:apple:cups:1.3.11 cpe:/a:foolabs:xpdf:0.2 cpe:/a:foolabs:xpdf:0.3 cpe:/a:foolabs:xpdf:0.4 cpe:/a:foolabs:xpdf:0.5 cpe:/a:foolabs:xpdf:0.5a cpe:/a:foolabs:xpdf:0.6 cpe:/a:foolabs:xpdf:0.7 cpe:/a:foolabs:xpdf:0.7a cpe:/a:foolabs:xpdf:0.80 cpe:/a:foolabs:xpdf:0.90 cpe:/a:foolabs:xpdf:0.91 cpe:/a:foolabs:xpdf:0.91a cpe:/a:foolabs:xpdf:0.91b cpe:/a:foolabs:xpdf:0.91c cpe:/a:foolabs:xpdf:0.92 cpe:/a:foolabs:xpdf:0.92a cpe:/a:foolabs:xpdf:0.92b cpe:/a:foolabs:xpdf:0.92c cpe:/a:foolabs:xpdf:0.92d cpe:/a:foolabs:xpdf:0.92e cpe:/a:foolabs:xpdf:0.93 cpe:/a:foolabs:xpdf:0.93a cpe:/a:foolabs:xpdf:0.93b cpe:/a:foolabs:xpdf:0.93c cpe:/a:foolabs:xpdf:1.00 cpe:/a:foolabs:xpdf:1.00a cpe:/a:foolabs:xpdf:1.01 cpe:/a:foolabs:xpdf:2.00 cpe:/a:foolabs:xpdf:2.01 cpe:/a:foolabs:xpdf:2.02 cpe:/a:foolabs:xpdf:2.03 cpe:/a:foolabs:xpdf:3.00 cpe:/a:foolabs:xpdf:3.01 cpe:/a:foolabs:xpdf:3.02 CVE-2009-0146 2009-04-23T13:30:01.547-04:00 2017-09-28T21:33:39.043-04:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2009-04-23T14:13:00.000-04:00 SECTRACK 1022073 BUGTRAQ 20090417 rPSA-2009-0059-1 poppler BUGTRAQ 20090417 rPSA-2009-0061-1 cups SECUNIA 34291 SECUNIA 34481 BID 34568 SECUNIA 34755 SECUNIA 34756 SECUNIA 34852 SECUNIA 34959 SECUNIA 34963 SECUNIA 34991 SECUNIA 35037 SECUNIA 35064 SECUNIA 35065 SECUNIA 35074 SECUNIA 35618 SECUNIA 35685 VUPEN ADV-2009-1065 VUPEN ADV-2009-1066 VUPEN ADV-2009-1077 VUPEN ADV-2009-1297 VUPEN ADV-2009-1621 VUPEN ADV-2010-1040 APPLE APPLE-SA-2009-05-12 APPLE APPLE-SA-2009-06-17-1 DEBIAN DSA-1790 DEBIAN DSA-1793 FEDORA FEDORA-2009-6972 FEDORA FEDORA-2009-6973 FEDORA FEDORA-2009-6982 GENTOO GLSA-200904-20 MANDRIVA MDVSA-2009:101 MANDRIVA MDVSA-2010:087 REDHAT RHSA-2009:0429 REDHAT RHSA-2009:0430 REDHAT RHSA-2009:0431 REDHAT RHSA-2009:0458 REDHAT RHSA-2009:0480 SLACKWARE SSA:2009-129-01 SUSE SUSE-SA:2009:024 SUSE SUSE-SR:2009:010 SUSE SUSE-SR:2009:012 CERT TA09-133A CONFIRM http://bugs.gentoo.org/show_bug.cgi?id=263028 CONFIRM http://support.apple.com/kb/HT3549 CONFIRM http://support.apple.com/kb/HT3639 CONFIRM http://wiki.rpath.com/Advisories:rPSA-2009-0059 CONFIRM http://wiki.rpath.com/Advisories:rPSA-2009-0061 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=490612 Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.