Уязвимость CVE-2009-3606: Информация

Описание

Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

Важность: CRITICAL (9,3)

Опубликовано: 21 октября 2009 г.
Изменено: 13 февраля 2023 г.
Идентификатор типа ошибки: CWE-189

Ссылки на рекомендации, решения и инструменты

    1. Конфигурация 1

      cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*

      cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*

      cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*

      cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*