[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2028-1 xpdf -- multiple

ID: oval:org.secpod.oval:def:600024Date: (C)2011-01-28   (M)2024-01-02
Class: PATCHFamily: unix




Several vulnerabilities have been identified in xpdf, a suite of tools for viewing and converting Portable Document Format files. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1188 and CVE-2009-3603 Integer overflow in SplashBitmap::SplashBitmap which might allow remote attackers to execute arbitrary code or an application crash via a crafted PDF document. CVE-2009-3604 NULL pointer dereference or heap-based buffer overflow in Splash::drawImage which might allow remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted PDF document. CVE-2009-3606 Integer overflow in the PSOutputDev::doImageL1Sep which might allow remote attackers to execute arbitrary code via a crafted PDF document. CVE-2009-3608 Integer overflow in the ObjectStream::ObjectStream which might allow remote attackers to execute arbitrary code via a crafted PDF document. CVE-2009-3609 Integer overflow in the ImageStream::ImageStream which might allow remote attackers to cause a denial of service via a crafted PDF document. For the stable distribution , this problem has been fixed in version 3.02-1.4+lenny2. For the testing distribution , this problem will be fixed soon. For the unstable distribution , this problem has been fixed in version 3.02-2.

Platform:
Debian 5.0
Product:
xpdf
Reference:
DSA-2028-1
CVE-2009-1188
CVE-2009-3603
CVE-2009-3604
CVE-2009-3606
CVE-2009-3608
CVE-2009-3609
CVE    6
CVE-2009-1188
CVE-2009-3606
CVE-2009-3603
CVE-2009-3604
...
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies