Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3608

Опубликовано: 14 окт. 2009
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

Дополнительная информация

Статус:

Important
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=526637xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016)

EPSS

Процентиль: 90%
0.0622
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

nvd
почти 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

debian
почти 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc ...

github
больше 3 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

oracle-oval
почти 16 лет назад

ELSA-2009-1513: cups security update (MODERATE)

EPSS

Процентиль: 90%
0.0622
Низкий

6.8 Medium

CVSS2