cpe:/a:apple:cups:1.1 cpe:/a:apple:cups:1.1.1 cpe:/a:apple:cups:1.1.2 cpe:/a:apple:cups:1.1.3 cpe:/a:apple:cups:1.1.4 cpe:/a:apple:cups:1.1.5 cpe:/a:apple:cups:1.1.5-1 cpe:/a:apple:cups:1.1.5-2 cpe:/a:apple:cups:1.1.6 cpe:/a:apple:cups:1.1.6-1 cpe:/a:apple:cups:1.1.6-2 cpe:/a:apple:cups:1.1.6-3 cpe:/a:apple:cups:1.1.7 cpe:/a:apple:cups:1.1.8 cpe:/a:apple:cups:1.1.9 cpe:/a:apple:cups:1.1.9-1 cpe:/a:apple:cups:1.1.10 cpe:/a:apple:cups:1.1.10-1 cpe:/a:apple:cups:1.1.11 cpe:/a:apple:cups:1.1.12 cpe:/a:apple:cups:1.1.13 cpe:/a:apple:cups:1.1.14 cpe:/a:apple:cups:1.1.15 cpe:/a:apple:cups:1.1.16 cpe:/a:apple:cups:1.1.17 cpe:/a:apple:cups:1.1.18 cpe:/a:apple:cups:1.1.19 cpe:/a:apple:cups:1.1.19:rc1 cpe:/a:apple:cups:1.1.19:rc2 cpe:/a:apple:cups:1.1.19:rc3 cpe:/a:apple:cups:1.1.19:rc4 cpe:/a:apple:cups:1.1.19:rc5 cpe:/a:apple:cups:1.1.20 cpe:/a:apple:cups:1.1.20:rc1 cpe:/a:apple:cups:1.1.20:rc2 cpe:/a:apple:cups:1.1.20:rc3 cpe:/a:apple:cups:1.1.20:rc4 cpe:/a:apple:cups:1.1.20:rc5 cpe:/a:apple:cups:1.1.20:rc6 cpe:/a:apple:cups:1.1.21 cpe:/a:apple:cups:1.1.21:rc1 cpe:/a:apple:cups:1.1.21:rc2 cpe:/a:apple:cups:1.1.22 cpe:/a:apple:cups:1.1.22:rc1 cpe:/a:apple:cups:1.1.22:rc2 cpe:/a:apple:cups:1.1.23 cpe:/a:apple:cups:1.1.23:rc1 cpe:/a:apple:cups:1.2.0 cpe:/a:apple:cups:1.2.1 cpe:/a:apple:cups:1.2.2 cpe:/a:apple:cups:1.2.3 cpe:/a:apple:cups:1.2.4 cpe:/a:apple:cups:1.2.5 cpe:/a:apple:cups:1.2.6 cpe:/a:apple:cups:1.2.7 cpe:/a:apple:cups:1.2.8 cpe:/a:apple:cups:1.2.9 cpe:/a:apple:cups:1.2.10 cpe:/a:apple:cups:1.2.11 cpe:/a:apple:cups:1.2.12 cpe:/a:apple:cups:1.3.0 cpe:/a:apple:cups:1.3.1 cpe:/a:apple:cups:1.3.2 cpe:/a:apple:cups:1.3.3 cpe:/a:apple:cups:1.3.4 cpe:/a:apple:cups:1.3.5 cpe:/a:apple:cups:1.3.6 cpe:/a:apple:cups:1.3.7 cpe:/a:apple:cups:1.3.8 cpe:/a:apple:cups:1.3.9 cpe:/a:apple:cups:1.3.10 cpe:/a:apple:cups:1.3.11 cpe:/a:foolabs:xpdf:0.2 cpe:/a:foolabs:xpdf:0.3 cpe:/a:foolabs:xpdf:0.4 cpe:/a:foolabs:xpdf:0.5 cpe:/a:foolabs:xpdf:0.5a cpe:/a:foolabs:xpdf:0.6 cpe:/a:foolabs:xpdf:0.7 cpe:/a:foolabs:xpdf:0.7a cpe:/a:foolabs:xpdf:0.80 cpe:/a:foolabs:xpdf:0.90 cpe:/a:foolabs:xpdf:0.91 cpe:/a:foolabs:xpdf:0.91a cpe:/a:foolabs:xpdf:0.91b cpe:/a:foolabs:xpdf:0.91c cpe:/a:foolabs:xpdf:0.92 cpe:/a:foolabs:xpdf:0.92a cpe:/a:foolabs:xpdf:0.92b cpe:/a:foolabs:xpdf:0.92c cpe:/a:foolabs:xpdf:0.92d cpe:/a:foolabs:xpdf:0.92e cpe:/a:foolabs:xpdf:0.93 cpe:/a:foolabs:xpdf:0.93a cpe:/a:foolabs:xpdf:0.93b cpe:/a:foolabs:xpdf:0.93c cpe:/a:foolabs:xpdf:1.00 cpe:/a:foolabs:xpdf:1.00a cpe:/a:foolabs:xpdf:1.01 cpe:/a:foolabs:xpdf:2.00 cpe:/a:foolabs:xpdf:2.01 cpe:/a:foolabs:xpdf:2.02 cpe:/a:foolabs:xpdf:2.03 cpe:/a:foolabs:xpdf:3.00 cpe:/a:foolabs:xpdf:3.01 cpe:/a:foolabs:xpdf:3.02 cpe:/a:poppler:poppler:0.1 cpe:/a:poppler:poppler:0.1.1 cpe:/a:poppler:poppler:0.1.2 cpe:/a:poppler:poppler:0.2.0 cpe:/a:poppler:poppler:0.3.0 cpe:/a:poppler:poppler:0.3.1 cpe:/a:poppler:poppler:0.3.2 cpe:/a:poppler:poppler:0.3.3 cpe:/a:poppler:poppler:0.4.0 cpe:/a:poppler:poppler:0.4.1 cpe:/a:poppler:poppler:0.4.2 cpe:/a:poppler:poppler:0.4.3 cpe:/a:poppler:poppler:0.4.4 cpe:/a:poppler:poppler:0.5.0 cpe:/a:poppler:poppler:0.5.1 cpe:/a:poppler:poppler:0.5.2 cpe:/a:poppler:poppler:0.5.3 cpe:/a:poppler:poppler:0.5.4 cpe:/a:poppler:poppler:0.5.9 cpe:/a:poppler:poppler:0.5.90 cpe:/a:poppler:poppler:0.5.91 cpe:/a:poppler:poppler:0.6.0 cpe:/a:poppler:poppler:0.6.1 cpe:/a:poppler:poppler:0.6.2 cpe:/a:poppler:poppler:0.6.3 cpe:/a:poppler:poppler:0.6.4 cpe:/a:poppler:poppler:0.7.0 cpe:/a:poppler:poppler:0.7.1 cpe:/a:poppler:poppler:0.7.2 cpe:/a:poppler:poppler:0.7.3 cpe:/a:poppler:poppler:0.8.0 cpe:/a:poppler:poppler:0.8.1 cpe:/a:poppler:poppler:0.8.2 cpe:/a:poppler:poppler:0.8.3 cpe:/a:poppler:poppler:0.8.4 cpe:/a:poppler:poppler:0.8.5 cpe:/a:poppler:poppler:0.8.6 cpe:/a:poppler:poppler:0.8.7 cpe:/a:poppler:poppler:0.9.0 cpe:/a:poppler:poppler:0.9.1 cpe:/a:poppler:poppler:0.9.2 cpe:/a:poppler:poppler:0.9.3 cpe:/a:poppler:poppler:0.10.0 cpe:/a:poppler:poppler:0.10.1 cpe:/a:poppler:poppler:0.10.2 cpe:/a:poppler:poppler:0.10.3 cpe:/a:poppler:poppler:0.10.4 cpe:/a:poppler:poppler:0.10.5 CVE-2009-1182 2009-04-23T13:30:01.813-04:00 2017-09-28T21:34:13.293-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2009-04-24T08:46:00.000-04:00 ALLOWS_OTHER_ACCESS SECTRACK 1022073 SECUNIA 34291 SECUNIA 34481 BID 34568 SECUNIA 34746 SECUNIA 34755 SECUNIA 34756 SECUNIA 34852 SECUNIA 34959 SECUNIA 34963 SECUNIA 34991 SECUNIA 35037 SECUNIA 35064 SECUNIA 35065 SECUNIA 35618 SECUNIA 35685 VUPEN ADV-2009-1065 VUPEN ADV-2009-1066 VUPEN ADV-2009-1076 VUPEN ADV-2009-1077 VUPEN ADV-2010-1040 DEBIAN DSA-1790 DEBIAN DSA-1793 FEDORA FEDORA-2009-6972 FEDORA FEDORA-2009-6973 FEDORA FEDORA-2009-6982 MANDRIVA MDVSA-2009:101 MANDRIVA MDVSA-2010:087 MANDRIVA MDVSA-2011:175 REDHAT RHSA-2009:0429 REDHAT RHSA-2009:0430 REDHAT RHSA-2009:0431 REDHAT RHSA-2009:0458 REDHAT RHSA-2009:0480 SLACKWARE SSA:2009-129-01 SUSE SUSE-SA:2009:024 SUSE SUSE-SR:2009:010 SUSE SUSE-SR:2009:012 CERT-VN VU#196617 CONFIRM http://poppler.freedesktop.org/releases.html CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=495896 Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.