CVE-2009-0791

N/A Unknown
Published: June 09, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/35340
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35685
Source: secalert@redhat.com
http://secunia.com/advisories/37023
Source: secalert@redhat.com
http://secunia.com/advisories/37028
Source: secalert@redhat.com
http://secunia.com/advisories/37037
Source: secalert@redhat.com
http://secunia.com/advisories/37043
Source: secalert@redhat.com
http://secunia.com/advisories/37077
Source: secalert@redhat.com
http://secunia.com/advisories/37079
Source: secalert@redhat.com
http://securitytracker.com/id?1022326
Source: secalert@redhat.com
http://www.securityfocus.com/bid/35195
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2009/1488
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35340
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35685
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37023
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37028
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37037
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37043
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37077
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37079
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1022326
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:334
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1083.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35195
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1488
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=491840
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/50941
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1500.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1501.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1502.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1503.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1512.html
Source: af854a3a-2127-422b-91ae-364da2661108

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
5.0%
90th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apple