Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2028-1 | New xpdf packages fix several vulnerabilities |
Debian DSA |
DSA-2050-1 | New kdegraphics packages fix several vulnerabilities |
EUVD |
EUVD-2009-3589 | Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. |
Ubuntu USN |
USN-850-1 | poppler vulnerabilities |
Ubuntu USN |
USN-850-3 | poppler vulnerabilities |
Ubuntu USN |
USN-973-1 | KOffice vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:31:10.520Z
Reserved: 2009-10-09T00:00:00
Link: CVE-2009-3608
No data.
Status : Deferred
Published: 2009-10-21T17:30:00.407
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-3608
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN