ID

VAR-200904-0800


CVE

CVE-2009-1183


TITLE

Xpdf and poppler contain multiple vulnerabilities in the processing of JBIG2 data

Trust: 0.8

sources: CERT/CC: VU#196617

DESCRIPTION

The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file. Xpdf and poppler contain multiple vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Xpdf is prone to multiple security vulnerabilities. Failed exploit attempts will likely cause denial-of-service conditions. These issues affect multiple applications on multiple platforms that use the affected library. Xpdf is an open source viewer for Portable Document Format (PDF) files. There is an infinite loop vulnerability in the JBIG2 decoder of Xpdf. =========================================================== Ubuntu Security Notice USN-759-1 April 16, 2009 poppler vulnerabilities CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183, CVE-2009-1187, CVE-2009-1188 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libpoppler1 0.5.1-0ubuntu7.5 libpoppler1-glib 0.5.1-0ubuntu7.5 Ubuntu 8.04 LTS: libpoppler-glib2 0.6.4-1ubuntu3.2 libpoppler2 0.6.4-1ubuntu3.2 Ubuntu 8.10: libpoppler-glib3 0.8.7-1ubuntu0.2 libpoppler3 0.8.7-1ubuntu0.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Will Dormann, Alin Rad Pop, Braden Thomas, and Drew Yao discovered that poppler contained multiple security issues in its JBIG2 decoder. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.5.diff.gz Size/MD5: 21822 ee2672a9c709fc45bba20251d742228d http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.5.dsc Size/MD5: 1734 417df81720e8d5ee948378e46344266d http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz Size/MD5: 954930 a136cd731892f4570933034ba97c8704 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 728824 02bafb241059bb00d7dd179a7b3f87f8 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 57680 5e71a261e7d45ac974ba5339e83fa1f0 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 46832 b26c23473c2f7fbd5772a2293e728bd4 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 52460 fe6720f5744cb5dc4c364cd261debe61 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 43064 04aaf723c5840483dce9c9419514f119 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 545476 c2026df404f7454ea0f88bc5a13adcbb http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_amd64.deb Size/MD5: 100770 05bc58055d3c0300a21e586f1a1d9d6f i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 660556 c03de988993f8e6ed1a70f51dc5c0b85 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 54376 f4dc07023877e1b401b5bfcc6f449f0e http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 44844 c3546e678a1e15a402117fc651ef0adb http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 50346 70b487ce1c48eb9bdf54bb7a6a48ebb8 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 42032 2c4464ab324a0487a1d2d0320dfe5bf9 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 504680 a33ec9d754e2fa60613433c6360e8852 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_i386.deb Size/MD5: 93734 672f71f41022667bfafd3cfc35a2d8d5 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 768550 6a4ee0ca5f076dde8095d69676069673 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 59710 5e6283468477fbccd2d35a03bb16b8e4 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 46982 0a24e869e3271baa354347e890ba094b http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 53716 ca80ec1ce07d2f80ce72f053328c909f http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 44322 b52d2a5e9f69b16ee6d943b6ec0f3681 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 551552 0bd6cd9e525e8e36f9eee210950a7ae9 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_powerpc.deb Size/MD5: 105340 1d853eb7bc4d4942bc0711eca7fce7e9 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 689740 faaa3864bd2adfb03cfdaa97c1d48319 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 56040 1c5727ec6910483ffe1b20fc0ee36bc0 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 45534 dcb43680133e29aa8079431a11351f12 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 50792 c37cb4dbcff7bedcde1f580324114122 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 41792 ce947a407a81d27fb3f57759f1d65f8a http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 516936 d2531d698776d806c337a64fb08a7a24 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_sparc.deb Size/MD5: 93294 7f2affbaa297a4ac7187a4b22637c50e Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.2.diff.gz Size/MD5: 17557 9956cc0feade9f57e318b5bfdccdc4d1 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.2.dsc Size/MD5: 1191 d8a44cb7ba34a831de069bd443674f2a http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4.orig.tar.gz Size/MD5: 1294481 13d12ca4e349574cfbbcf4a9b2b3ae52 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 894720 77f633ead72bc1dab33d6a8070f9ba13 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 109116 eb8bdbe2378e703991451e68ba383904 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 54834 3a7d5fc5a01c1b9d7dc2be64308c8d62 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 45612 88fd64b195260ca983e7d43b07e390ae http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 25526 e12cf3455212e63cc1e038f96f99c88a http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 146700 af75603f105efd14c1b02f14963c3d34 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 200830 3be91ed2b26826fb05a743dcf3d72451 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 647120 fcebc612ebfb30bf448ee7b933f3edd7 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_amd64.deb Size/MD5: 79032 d064240469a5fbbaf36337ff986c279b i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 838872 9a493778231377e881330829aed9e699 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 102856 cdcd1e4723a89f4e1323cee86d7d80fa http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 52338 2adc861c0df4bebc596a5dcb03718315 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 42010 5cdd1f923759c1994f8d80704c146d4c http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 25052 c2d49f200955755334b69d5a37d66895 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 143524 32f70c716ca24e23edbb1e5924539fd2 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 189408 c29f8901fdce5a0f57a9cb065f9ff1af http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 621946 5cace5c938fbe9d8d8bd118be900a92b http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_i386.deb Size/MD5: 73694 54cb7ac393b179086a4acd9ddc3cd905 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 859272 95b9dc7995dcf151aa121b65981f2dff http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 103808 bc83498bf086f011403f0a134f328f38 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 52598 1bbd83ca4051ebb24bd868dc693392a0 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 42440 5cd495884ee2ae1e9a4b79e705f7c93e http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 24800 266f88db5b42dcb94278b88f4c0826ae http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 145068 7afffd22188dae40a39619f1d1aa1bc6 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 190710 0e5622fd37fdc7c843be8ba11b3040f6 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 635616 5ccd9d05916c38e1605d80bebc4cb2c4 http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_lpia.deb Size/MD5: 74708 3a703841d66a5bf44b46cf48a6894d03 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 956650 018a8af8ddafcf05943faeac06bedd3d http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 115806 b1529f575c949c2d6583629bd8d37c4c http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 58450 650386a0cc9c7159efa0b928a1a89700 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 45538 4b602025e65e9780a2ba7d011c835b6b http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 28860 509df8d62136b867dc220f81edff6338 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 152692 9637c628b9111dbe9894ddaf79e8dc40 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 208860 5c2d657a5cb8b3d48d3ae313bde8c89a http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 682708 42e6c86a4e096c09159c9afa7a63d8fe http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_powerpc.deb Size/MD5: 94440 d9d0ad1f5d57864d93ca5701a7a8159e sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 859434 c8c968ec2fadf9d79930adbe82456494 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 104150 0d3adc8f783a0e8b279b12998455d0ab http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 51414 995a2ad8cc3b87493392ef0242b6f946 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 41422 fbd7d3dddaef15fa79658ca138effb39 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 23900 b7d5b2acff322f4851720e509d729efc http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 145336 1af69f410bf023e5e9b8e2dcfadf47dc http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 192594 090a4e5d9f508209aac5d8b23655abc9 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 630572 88fb1279950befc44aa3c0807e67e3e6 http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_sparc.deb Size/MD5: 72996 2fb8dadd275f0f53c3a95c0593afed9a Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7-1ubuntu0.2.diff.gz Size/MD5: 18843 e2d09ee9d90d327212bec87804d90265 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7-1ubuntu0.2.dsc Size/MD5: 1600 b75e9b1fcb0f3745cf3116b74aea82d9 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7.orig.tar.gz Size/MD5: 1469587 9af81429d6f8639c357a5eed25583365 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 966242 6f6cb37e5bd6a49c9f0c22b490e285ba http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 123224 2fda4eb60652c3d15cc27295e2458c29 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 64122 3686ab6935365d008fab4c2af6cf13b9 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 47432 d2a40ee897a569f5e4a009bfc0fa2a58 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 25634 b1e0a2f742c4606875c48a6ec18f8f47 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 159060 ff062d8f9570abd3fdb115634c44e218 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 221316 eece0a0c1b5e1df3807a67a31803dd06 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 694472 bcba4f632dadc9667622e6a328650630 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 3010340 8286ca2bbd3889a2a33d73d93f02a909 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_amd64.deb Size/MD5: 79510 94e74ec03e257dc25f6317eb31b10a8d i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 899730 58af3f0799ac6bb90be401c57bcf4347 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 116042 124e0a697a9bd0efabd4bc8d9defec75 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 60960 b5b4232fb307dca0059ce18a4c3fca99 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 44248 5c9350ce672fe85f1fa1e66883e4199a http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 24982 79c4101c39e3f02f2dd0a54a041d5ea8 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 157484 3f63fdc1dd2d892f52003345d7d8dcfc http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 207238 39283f443a396487f8528286fdf1cb18 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 667526 ea020610b90389ea1bcdf82ee7fe01f9 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 2923292 27ae061875a6a1ceb3a13441db372677 http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_i386.deb Size/MD5: 74880 ee2d2abe02acd27ce13fed13ccbce0a3 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 919118 a83374b620e00264407296f579b0548c http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 116666 1c08e6a53b66a948f529e3177fabaefa http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 60938 d2f38eb926826883d651211913b8b2cb http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 44492 0426c36b92c70c950e74c3bf68876e9a http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 24642 bb5fa901ab47e008de3bdd9f6251f60a http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 157960 b55e5bcad635f4ac94fa357a9a2c8575 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 206984 8283809c638c1d7066a68f36758f6d94 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 677578 b448c5cb4f08e46c1b431e2481c66352 http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 2955400 9ecef1af0bf52940be2e12ae17b949aa http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_lpia.deb Size/MD5: 75868 34aa6515643f0f66f32bb9dcd7f0a876 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 1028420 278655a5a31b50093ebbd185adff5faa http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 130934 229a04497213f731752fe05575ee8815 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 68654 09ec34fc785d5769556226502399391d http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 47702 0088fd41a51480e81dfaef4a14270648 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 28480 fa340df42efe8084892fc7c2313a4b8f http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 163314 44d9561205bbeb66beeefa6cf0fdcf74 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 224374 9dd31f95a8907cca6d0cbccfbbd598aa http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 727622 5cabcdf6871d0a227ce07a6b023866ae http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 3103848 e91e2c97387cec5501e506a6c207c6f9 http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_powerpc.deb Size/MD5: 92476 78062e0b827c00df87316a269be3c34a sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 922376 2e63ae9a566aba990b0640d2444006ee http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 119570 6b293091030d45fa6c1bbe55c6872ae7 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 60760 3d03ff89ed7abd54add409390d290a31 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 44072 51a729a6a171b5177e8d5c7d0ce4db03 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 23882 35bfdcfa52d8c9de0d53aee686be574b http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 156180 50f88e2842f028230dc39c75e7eae7ce http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 211922 f691ed631e29966dc3456d40f68310e9 http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 674560 9260e9b69be74bed00147c89e1d7baf7 http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 2871332 11739833f2d4cc07d786f38b701c69c4 http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_sparc.deb Size/MD5: 75294 997f050aa9d4a53bb6ec015d15cbf6ea . Additionally the kdegraphics package was rebuild to make kdegraphics-kpdf link correctly to the new poppler libraries and are also provided. (CVE-2009-0165). NOTE: some of these details are obtained from third party information. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603). NOTE: this may overlap CVE-2009-0791 (CVE-2009-3605). NOTE: some of these details are obtained from third party information (CVE-2009-3607). This update provides fixes for that vulnerabilities. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 0b4c544fea742c847cb56b9fbc33f412 2008.0/i586/libpoppler3-0.8.7-2.4mdv2008.0.i586.rpm b991aecb282a882f6ee5640bcc832e5d 2008.0/i586/libpoppler-devel-0.8.7-2.4mdv2008.0.i586.rpm afe27149192bdca20b911965febc5ee2 2008.0/i586/libpoppler-glib3-0.8.7-2.4mdv2008.0.i586.rpm 379d7bdd3dde6cbf9bd43c7b9e2723c3 2008.0/i586/libpoppler-glib-devel-0.8.7-2.4mdv2008.0.i586.rpm d7f58c500ff93f75998e1a0ba8e05c9e 2008.0/i586/libpoppler-qt2-0.8.7-2.4mdv2008.0.i586.rpm 64a5f31e3feb593c1ce0be10a24aec43 2008.0/i586/libpoppler-qt4-3-0.8.7-2.4mdv2008.0.i586.rpm 5e3182c22daabbf93056b8a94545fbd9 2008.0/i586/libpoppler-qt4-devel-0.8.7-2.4mdv2008.0.i586.rpm 9eaa15826e2ab184de24cf0b1aeda2e6 2008.0/i586/libpoppler-qt-devel-0.8.7-2.4mdv2008.0.i586.rpm 53fa179984dc9c0442292a77bab496b0 2008.0/i586/poppler-0.8.7-2.4mdv2008.0.i586.rpm c8146a94a038650fc5a1704196b1b087 2008.0/SRPMS/poppler-0.8.7-2.4mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: ebde9bf055ba6854f7348da4dd2ba7b4 2008.0/x86_64/lib64poppler3-0.8.7-2.4mdv2008.0.x86_64.rpm c200ff892641cebd5e49ebc2d05fb1c0 2008.0/x86_64/lib64poppler-devel-0.8.7-2.4mdv2008.0.x86_64.rpm 6ee35af2904995be70a1d83adc2a2d86 2008.0/x86_64/lib64poppler-glib3-0.8.7-2.4mdv2008.0.x86_64.rpm a4ad93d7caf1bfaa25f1e511da8c9208 2008.0/x86_64/lib64poppler-glib-devel-0.8.7-2.4mdv2008.0.x86_64.rpm 86205b42fd719dd722799de7f215d021 2008.0/x86_64/lib64poppler-qt2-0.8.7-2.4mdv2008.0.x86_64.rpm 523f9debc4c5db056eb5484aa066960e 2008.0/x86_64/lib64poppler-qt4-3-0.8.7-2.4mdv2008.0.x86_64.rpm 79a6a65ada1a4e4573d9ca50ea1995f0 2008.0/x86_64/lib64poppler-qt4-devel-0.8.7-2.4mdv2008.0.x86_64.rpm ea0e41c890b571f6bbc217983aa2f3ec 2008.0/x86_64/lib64poppler-qt-devel-0.8.7-2.4mdv2008.0.x86_64.rpm 2086f89f02c674a8428f9d88d9e3c8d2 2008.0/x86_64/poppler-0.8.7-2.4mdv2008.0.x86_64.rpm c8146a94a038650fc5a1704196b1b087 2008.0/SRPMS/poppler-0.8.7-2.4mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLkQPLmqjQ0CJFipgRAh18AKC9klNDmYh9cWPAgnry39C+ILqtbgCgk0x1 TR6oNGOz4KatmzdzlfhR5eI= =Exwz -----END PGP SIGNATURE----- . (CVE-2009-1183) Two integer overflow flaws were found in the CUPS pdftops filter. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201310-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Poppler: Multiple vulnerabilities Date: October 06, 2013 Bugs: #263028, #290430, #290464, #308017, #338878, #352581, #459866, #480366 ID: 201310-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Poppler, some of which may allow execution of arbitrary code. Background ========== Poppler is a cross-platform PDF rendering library originally based on Xpdf. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-text/poppler < 0.22.2-r1 >= 0.22.2-r1 Description =========== Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Poppler users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/poppler-0.22.2-r1" References ========== [ 1 ] CVE-2009-0146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0146 [ 2 ] CVE-2009-0147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0147 [ 3 ] CVE-2009-0165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0165 [ 4 ] CVE-2009-0166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0166 [ 5 ] CVE-2009-0195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0195 [ 6 ] CVE-2009-0799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0799 [ 7 ] CVE-2009-0800 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0800 [ 8 ] CVE-2009-1179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1179 [ 9 ] CVE-2009-1180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1180 [ 10 ] CVE-2009-1181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1181 [ 11 ] CVE-2009-1182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1182 [ 12 ] CVE-2009-1183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1183 [ 13 ] CVE-2009-1187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1187 [ 14 ] CVE-2009-1188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1188 [ 15 ] CVE-2009-3603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603 [ 16 ] CVE-2009-3604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604 [ 17 ] CVE-2009-3605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3605 [ 18 ] CVE-2009-3606 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606 [ 19 ] CVE-2009-3607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607 [ 20 ] CVE-2009-3608 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608 [ 21 ] CVE-2009-3609 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609 [ 22 ] CVE-2009-3938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3938 [ 23 ] CVE-2010-3702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702 [ 24 ] CVE-2010-3703 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3703 [ 25 ] CVE-2010-3704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704 [ 26 ] CVE-2010-4653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4653 [ 27 ] CVE-2010-4654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4654 [ 28 ] CVE-2012-2142 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2142 [ 29 ] CVE-2013-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1788 [ 30 ] CVE-2013-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1789 [ 31 ] CVE-2013-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1790 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201310-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.52

sources: NVD: CVE-2009-1183 // CERT/CC: VU#196617 // BID: 34568 // VULHUB: VHN-38629 // PACKETSTORM: 76751 // PACKETSTORM: 89072 // PACKETSTORM: 77104 // PACKETSTORM: 86958 // PACKETSTORM: 82087 // PACKETSTORM: 123523

AFFECTED PRODUCTS

vendor:applemodel:cupsscope:eqversion:1.1.3

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.1

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.5

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.6

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.5-2

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.4

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.6-1

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.2

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.5-1

Trust: 1.6

vendor:popplermodel:popplerscope:eqversion:0.5.1

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.10.3

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.10.4

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.8.4

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.4.1

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.3.2

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.5.3

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.5.4

Trust: 1.3

vendor:popplermodel:popplerscope:eqversion:0.4.2

Trust: 1.3

vendor:foolabsmodel:xpdfscope:eqversion:0.5a

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.5.90

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.12

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.18

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.3

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.7

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.0

Trust: 1.0

vendor:applemodel:cupsscope:lteversion:1.3.9

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.2

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.3

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.10

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:1.01

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:3.00

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.0

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.7.0

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.91b

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:lteversion:3.02

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.9.0

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.9.1

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.90

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.6-2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.6

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.5

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.92e

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.91a

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.92c

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.10.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.1

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.93c

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.4.0

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.6.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.11

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:2.00

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.17

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.5

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.9

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.14

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.92b

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:1.00

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.4.4

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.6

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.4

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:2.01

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.21

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.8

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.10

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.9.3

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.91

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.2

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:1.00a

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.7

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.7

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.5

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.22

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.15

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.13

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.92a

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.10-1

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.93a

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.92d

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.92

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.5.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.9

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.6.4

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.8

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.10.0

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.10.1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.20

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.5.9

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.1

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.80

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:3.01

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.5.0

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.7.3

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.6

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.3.3

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.6.3

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.9.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.6-3

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.8

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:2.02

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.10

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.9-1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.7

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.6

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.19

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.93

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.7

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.2.0

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.7a

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.6.0

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.11

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.1.1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.12

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.2

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:2.03

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.91c

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.8.1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.3.11

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.5.91

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.3.1

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.6.1

Trust: 1.0

vendor:foolabsmodel:xpdfscope:eqversion:0.93b

Trust: 1.0

vendor:popplermodel:popplerscope:lteversion:0.10.5

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.1.2

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.16

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.7.1

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.1.23

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.7.2

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.3.0

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.3

Trust: 1.0

vendor:popplermodel:popplerscope:eqversion:0.4.3

Trust: 1.0

vendor:glyphandcogmodel:xpdfreaderscope:eqversion:0.4

Trust: 1.0

vendor:applemodel:cupsscope:eqversion:1.2.3

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandriva s amodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:popplermodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:research in motion rimmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:turbolinuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:xpdfmodel: - scope: - version: -

Trust: 0.8

vendor:kdemodel:kdescope:eqversion:3.4.1

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:2.00

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.3.2

Trust: 0.3

vendor:popplermodel:popplerscope:neversion:0.10.6

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.5

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:susemodel:linux enterprise sp2 debuginfoscope:eqversion:10

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:3.01

Trust: 0.3

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise sp1 debuginfoscope:eqversion:10

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.0.1

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:3.00

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.1

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.4.2

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:9

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:2.03

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:xpdfmodel:pl2scope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:1.01

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:3.02

Trust: 0.3

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 45scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 28scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.90

Trust: 0.3

vendor:sunmodel:opensolaris build snv 39scope: - version: -

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.2

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.80

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 51scope: - version: -

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:s u s emodel:suse linux enterprise server rt solutionscope:eqversion:100

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.4-2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 29scope: - version: -

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 41scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:rimmodel:blackberry enterprise serverscope:eqversion:4.1.6

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:3.00

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.4

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:2.02

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:xpdfmodel:3.02pl2scope: - version: -

Trust: 0.3

vendor:xpdfmodel:3.02pl1scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4.3

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.03

Trust: 0.3

vendor:xpdfmodel:1pl1scope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:intuity audix lx sp2scope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:pdfeditmodel:pdfeditscope:eqversion:0.4.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:2.01

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 112scope: - version: -

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.3.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.6

Trust: 0.3

vendor:rimmodel:blackberry enterprise serverscope:eqversion:4.1.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 36scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.2

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 48scope: - version: -

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.4

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.3

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.02

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:xpdfmodel:3.02pl3scope:neversion: -

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:pdfeditmodel:pdfeditscope:neversion:0.4.3

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.92

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:2

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:popplermodel:popplerscope:eqversion:0.4.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.01

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.4

Trust: 0.3

vendor:easymodel:software products cupsscope:neversion:1.3.10

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:3.1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.5

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 113scope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.8

Trust: 0.3

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:rimmodel:blackberry enterprise serverscope:eqversion:4.1.5

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.8

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.3

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.93

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.2.1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.9

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:rimmodel:blackberry enterprise serverscope:eqversion:4.1.3

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:applemodel:safariscope:neversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.12

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:rimmodel:blackberry professional softwarescope:eqversion:4.1.4

Trust: 0.3

vendor:popplermodel:popplerscope:eqversion:0.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.2

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.91

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.7

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 114scope:neversion: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.9

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:gnomemodel:gpdfscope:eqversion:2.8.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 38scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.5

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.0.5

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.0.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.10

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:avayamodel:intuity audix lx sp1scope:eqversion:2.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.3

Trust: 0.3

vendor:kdemodel:bscope:eqversion:3.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 98scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.0.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:xpdfmodel:xpdfscope:eqversion:2.0.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:0.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:3.01

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:1.00

Trust: 0.3

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.4.3

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.9

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.3

vendor:xpdfmodel:pl1scope:eqversion:2.0.2

Trust: 0.3

vendor:xpdfmodel:(patchscope:eqversion:3.0.12)

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 47scope: - version: -

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:foolabsmodel:xpdfscope:eqversion:3.02

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 37scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.5.4

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.1.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.3

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.2

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:xpdfmodel:pl3scope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#196617 // BID: 34568 // CNNVD: CNNVD-200904-455 // NVD: CVE-2009-1183

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1183
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#196617
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200904-455
value: MEDIUM

Trust: 0.6

VULHUB: VHN-38629
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-1183
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CARNEGIE MELLON: VU#196617
severity: HIGH
baseScore: 9.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-38629
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#196617 // VULHUB: VHN-38629 // CNNVD: CNNVD-200904-455 // NVD: CVE-2009-1183

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.1

sources: VULHUB: VHN-38629 // NVD: CVE-2009-1183

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200904-455

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200904-455

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#196617

EXTERNAL IDS

db:BIDid:34568

Trust: 2.8

db:CERT/CCid:VU#196617

Trust: 2.8

db:NVDid:CVE-2009-1183

Trust: 2.6

db:SECTRACKid:1022072

Trust: 2.5

db:SECUNIAid:34291

Trust: 2.5

db:SECUNIAid:34481

Trust: 1.7

db:SECUNIAid:35064

Trust: 1.7

db:SECUNIAid:34746

Trust: 1.7

db:SECUNIAid:35618

Trust: 1.7

db:SECUNIAid:34756

Trust: 1.7

db:SECUNIAid:34852

Trust: 1.7

db:SECUNIAid:35065

Trust: 1.7

db:SECUNIAid:34959

Trust: 1.7

db:SECUNIAid:35685

Trust: 1.7

db:SECUNIAid:34991

Trust: 1.7

db:SECUNIAid:34963

Trust: 1.7

db:SECUNIAid:34755

Trust: 1.7

db:SECUNIAid:35037

Trust: 1.7

db:VUPENid:ADV-2010-1040

Trust: 1.7

db:VUPENid:ADV-2009-1076

Trust: 1.7

db:VUPENid:ADV-2009-1066

Trust: 1.7

db:VUPENid:ADV-2009-1077

Trust: 1.7

db:VUPENid:ADV-2009-1065

Trust: 1.7

db:CNNVDid:CNNVD-200904-455

Trust: 0.6

db:VULHUBid:VHN-38629

Trust: 0.1

db:PACKETSTORMid:76751

Trust: 0.1

db:PACKETSTORMid:89072

Trust: 0.1

db:PACKETSTORMid:77104

Trust: 0.1

db:PACKETSTORMid:86958

Trust: 0.1

db:PACKETSTORMid:82087

Trust: 0.1

db:PACKETSTORMid:123523

Trust: 0.1

sources: CERT/CC: VU#196617 // VULHUB: VHN-38629 // BID: 34568 // PACKETSTORM: 76751 // PACKETSTORM: 89072 // PACKETSTORM: 77104 // PACKETSTORM: 86958 // PACKETSTORM: 82087 // PACKETSTORM: 123523 // CNNVD: CNNVD-200904-455 // NVD: CVE-2009-1183

REFERENCES

url:http://www.debian.org/security/2009/dsa-1790

Trust: 3.1

url:http://www.securityfocus.com/bid/34568

Trust: 3.1

url:http://www.debian.org/security/2009/dsa-1793

Trust: 2.3

url:http://www.kb.cert.org/vuls/id/196617

Trust: 2.0

url:http://www.securitytracker.com/id?1022072

Trust: 1.7

url:http://secunia.com/advisories/34291

Trust: 1.7

url:http://secunia.com/advisories/34481

Trust: 1.7

url:http://secunia.com/advisories/34746

Trust: 1.7

url:http://secunia.com/advisories/34755

Trust: 1.7

url:http://secunia.com/advisories/34756

Trust: 1.7

url:http://secunia.com/advisories/34852

Trust: 1.7

url:http://secunia.com/advisories/34959

Trust: 1.7

url:http://secunia.com/advisories/34963

Trust: 1.7

url:http://secunia.com/advisories/34991

Trust: 1.7

url:http://secunia.com/advisories/35037

Trust: 1.7

url:http://secunia.com/advisories/35064

Trust: 1.7

url:http://secunia.com/advisories/35065

Trust: 1.7

url:http://secunia.com/advisories/35618

Trust: 1.7

url:http://secunia.com/advisories/35685

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1065

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1066

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1076

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1077

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/1040

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-july/msg00567.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01277.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01291.html

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:101

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:087

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:175

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2009-0429.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2009-0430.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2009-0431.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2009-0458.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2009-0480.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

Trust: 1.7

url:http://poppler.freedesktop.org/releases.html

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=495899

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10769

Trust: 1.7

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477

Trust: 1.6

url:http://cgit.freedesktop.org/poppler/poppler/commit/?id=9f1312f3d7dfa7e536606a7c7296b7c876b11c00

Trust: 0.8

url:ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl3.patch

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-759-1

Trust: 0.8

url:http://blackberry.com/btsc/kb17953

Trust: 0.8

url:http://rhn.redhat.com/errata/rhsa-2009-0429.html

Trust: 0.8

url:http://rhn.redhat.com/errata/rhsa-2009-0431.html

Trust: 0.8

url:http://www.mandriva.com/en/security/advisories?name=mdvsa-2009:101

Trust: 0.8

url:http://support.apple.com/kb/ht3549

Trust: 0.8

url:http://secunia.com/advisories/34291/

Trust: 0.8

url:http://www.securitytracker.com/alerts/2009/apr/1022072.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu196617/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2009-1181

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-0799

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-1182

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-1183

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-1180

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-1179

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-0800

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0480

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0431

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2010:0399

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2010:0400

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0458

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0430

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0429

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2009-1183

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-0166

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-0146

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-0147

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-1188

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1181

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0800

Trust: 0.4

url:http://www.mandriva.com/security/

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0799

Trust: 0.4

url:http://www.mandriva.com/security/advisories

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1180

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1183

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1182

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1179

Trust: 0.4

url:http://www.easysw.com/

Trust: 0.3

url:http://sourceforge.net/project/shownotes.php?release_id=698655

Trust: 0.3

url:http://poppler.freedesktop.org/

Trust: 0.3

url:http://www.foolabs.com/xpdf/

Trust: 0.3

url:http://www.mandriva.com/en/security/advisories?name=mdvsa-2009:346

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-269008-1

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2009-163.htm

Trust: 0.3

url:http://www.blackberry.com/btsc/dynamickc.do?externalid=kb17953&sliceid=1&command=show&forward=nonthreadedkc&kcid=kb17953

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1187

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0147

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0166

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0146

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0195

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3604

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3606

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3603

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0165

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3609

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3608

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3603

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3606

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1188

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3604

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0195

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0165

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3607

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3938

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3609

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3608

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3605

Trust: 0.2

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.5.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.5.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7-1ubuntu0.2.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.8.7-1ubuntu0.2.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler3_0.8.7-1ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib3_0.8.7-1ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.8.7-1ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.5_powerpc.deb

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1187

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3605

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3938

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3607

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0163

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0791

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0163

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0949

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1180

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0165

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0800

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3606

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3608

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3609

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3702

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3702

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1790

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3604

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1789

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3703

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3607

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3938

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1788

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201310-03.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3704

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3704

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3605

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0799

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3703

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0147

Trust: 0.1

sources: CERT/CC: VU#196617 // VULHUB: VHN-38629 // BID: 34568 // PACKETSTORM: 76751 // PACKETSTORM: 89072 // PACKETSTORM: 77104 // PACKETSTORM: 86958 // PACKETSTORM: 82087 // PACKETSTORM: 123523 // CNNVD: CNNVD-200904-455 // NVD: CVE-2009-1183

CREDITS

Alin Rad Pop Will Dormann

Trust: 0.6

sources: CNNVD: CNNVD-200904-455

SOURCES

db:CERT/CCid:VU#196617
db:VULHUBid:VHN-38629
db:BIDid:34568
db:PACKETSTORMid:76751
db:PACKETSTORMid:89072
db:PACKETSTORMid:77104
db:PACKETSTORMid:86958
db:PACKETSTORMid:82087
db:PACKETSTORMid:123523
db:CNNVDid:CNNVD-200904-455
db:NVDid:CVE-2009-1183

LAST UPDATE DATE

2025-02-18T22:33:57.935000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#196617date:2012-03-28T00:00:00
db:VULHUBid:VHN-38629date:2023-02-13T00:00:00
db:BIDid:34568date:2015-04-13T21:14:00
db:CNNVDid:CNNVD-200904-455date:2023-04-28T00:00:00
db:NVDid:CVE-2009-1183date:2024-11-21T01:01:51.470

SOURCES RELEASE DATE

db:CERT/CCid:VU#196617date:2009-04-16T00:00:00
db:VULHUBid:VHN-38629date:2009-04-23T00:00:00
db:BIDid:34568date:2009-04-16T00:00:00
db:PACKETSTORMid:76751date:2009-04-16T22:44:57
db:PACKETSTORMid:89072date:2010-04-30T00:07:35
db:PACKETSTORMid:77104date:2009-04-29T19:11:04
db:PACKETSTORMid:86958date:2010-03-06T15:35:47
db:PACKETSTORMid:82087date:2009-10-21T02:57:54
db:PACKETSTORMid:123523date:2013-10-07T22:31:57
db:CNNVDid:CNNVD-200904-455date:2009-04-23T00:00:00
db:NVDid:CVE-2009-1183date:2009-04-23T17:30:01.827