Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3608

Опубликовано: 14 окт. 2009
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

Дополнительная информация

Статус:

Important
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=526637xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016)

EPSS

Процентиль: 94%
0.12664
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

nvd
больше 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

debian
больше 16 лет назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc ...

github
почти 4 года назад

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

oracle-oval
больше 16 лет назад

ELSA-2009-1513: cups security update (MODERATE)

EPSS

Процентиль: 94%
0.12664
Средний

6.8 Medium

CVSS2