CVE-2009-1183

N/A Unknown
Published: April 23, 2009 Modified: April 23, 2026
View on NVD

Description

The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://poppler.freedesktop.org/releases.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2009-0458.html
Source: secalert@redhat.com
Patch
http://secunia.com/advisories/34291
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34481
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34746
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34755
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34756
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34852
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34959
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34963
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34991
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35037
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35064
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35065
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35618
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35685
Source: secalert@redhat.com
Vendor Advisory
http://www.debian.org/security/2009/dsa-1790
Source: secalert@redhat.com
Patch
http://www.debian.org/security/2009/dsa-1793
Source: secalert@redhat.com
Patch
http://www.kb.cert.org/vuls/id/196617
Source: secalert@redhat.com
US Government Resource
http://www.securityfocus.com/bid/34568
Source: secalert@redhat.com
Patch
http://www.vupen.com/english/advisories/2009/1065
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1066
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1076
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1077
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1040
Source: secalert@redhat.com
Vendor Advisory
http://poppler.freedesktop.org/releases.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2009-0458.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/34291
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34481
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34746
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34755
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34756
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34852
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34959
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34963
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34991
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35037
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35064
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35065
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35618
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35685
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2009/dsa-1790
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.debian.org/security/2009/dsa-1793
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.kb.cert.org/vuls/id/196617
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2009:101
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0429.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.redhat.com/support/errata/RHSA-2009-0430.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.redhat.com/support/errata/RHSA-2009-0431.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0480.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/34568
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securitytracker.com/id?1022072
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1065
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1066
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1076
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1077
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1040
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=495899
Source: af854a3a-2127-422b-91ae-364da2661108

84 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
82th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apple poppler foolabs glyphandcog