ID

VAR-200906-0618


CVE

CVE-2009-0791


TITLE

CUPS of pdftops Integer overflow vulnerability in filters

Trust: 0.8

sources: JVNDB: JVNDB-2009-001734

DESCRIPTION

Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179. CUPS of pdftops The filter includes PDF Insufficient service operation due to incomplete file processing (DoS) Vulnerabilities exist that could be exploited or arbitrary code executed.Crafted by a third party PDF Service operation disrupted by file (DoS) May be executed, or arbitrary code may be executed. CUPS is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to properly bounds-check user-supplied input before copying it into a finite-sized buffer. Exploiting these issues may allow remote attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Xpdf is an open source viewer for Portable Document Format (PDF) files. NOTE: This may override CVE-2009-0791. (CVE-2009-0791). (CVE-2009-1709). This update provides a solution to this vulnerability. (CVE-2009-0163) Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to g*allocn. (CVE-2009-0800) The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags. (CVE-2009-1183) Two integer overflow flaws were found in the CUPS pdftops filter. An attacker could create a malicious PDF file that would cause pdftops to crash or, potentially, execute arbitrary code as the lp user if the file was printed. (CVE-2009-3608, CVE-2009-3609) This update corrects the problems. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 6b17f59f63c062c017c78d459dd2d89a 2008.0/i586/cups-1.3.10-0.1mdv2008.0.i586.rpm 9bc5298d9895c356227fdda3a0ddb2c0 2008.0/i586/cups-common-1.3.10-0.1mdv2008.0.i586.rpm e3583883df8532fc8c496866dac713f8 2008.0/i586/cups-serial-1.3.10-0.1mdv2008.0.i586.rpm fac1fcb839ad53322a447d4d39f769e3 2008.0/i586/libcups2-1.3.10-0.1mdv2008.0.i586.rpm 3d65afc590fb8520d68b2a3e8e1da696 2008.0/i586/libcups2-devel-1.3.10-0.1mdv2008.0.i586.rpm 9e09ed22a2522ee45e93e0edc146193f 2008.0/i586/libpoppler2-0.6-3.5mdv2008.0.i586.rpm 7427b1f56387e84db5a15aad85b424d2 2008.0/i586/libpoppler-devel-0.6-3.5mdv2008.0.i586.rpm 67937a584d365d6b00ef688c88e8d7c5 2008.0/i586/libpoppler-glib2-0.6-3.5mdv2008.0.i586.rpm 410dc85c2c7b71ab316be5607c556682 2008.0/i586/libpoppler-glib-devel-0.6-3.5mdv2008.0.i586.rpm 64d6e14be8d93c7651ce5dc3e2ebc5bf 2008.0/i586/libpoppler-qt2-0.6-3.5mdv2008.0.i586.rpm cc9af7e314b6eaa6a8f946fa2c27f298 2008.0/i586/libpoppler-qt4-2-0.6-3.5mdv2008.0.i586.rpm 0c6d3a6b5211e8506a89144b8c3a3cfb 2008.0/i586/libpoppler-qt4-devel-0.6-3.5mdv2008.0.i586.rpm c985516638ed4d8f792daa13bd506023 2008.0/i586/libpoppler-qt-devel-0.6-3.5mdv2008.0.i586.rpm 8d05619dcef538092696ce70998abd20 2008.0/i586/php-cups-1.3.10-0.1mdv2008.0.i586.rpm 0bae2a3525b796882d2cc87853945e5a 2008.0/i586/poppler-0.6-3.5mdv2008.0.i586.rpm f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 8249475feb3bdc74ea7060944baed6aa 2008.0/x86_64/cups-1.3.10-0.1mdv2008.0.x86_64.rpm 83951504acb783cfdb8ec4fe48d31e1e 2008.0/x86_64/cups-common-1.3.10-0.1mdv2008.0.x86_64.rpm fa8a91e8e3bc8f11c19ab460d1f690fe 2008.0/x86_64/cups-serial-1.3.10-0.1mdv2008.0.x86_64.rpm e061fdbeded2d97bb3ca6b34d33cb384 2008.0/x86_64/lib64cups2-1.3.10-0.1mdv2008.0.x86_64.rpm 893235ea8cf23295ae961ea2de0b9903 2008.0/x86_64/lib64cups2-devel-1.3.10-0.1mdv2008.0.x86_64.rpm 9844640563afdef4a870e2ed12e58136 2008.0/x86_64/lib64poppler2-0.6-3.5mdv2008.0.x86_64.rpm 06ea824a6a2cd9360a9e75a14718192a 2008.0/x86_64/lib64poppler-devel-0.6-3.5mdv2008.0.x86_64.rpm bb0eb04fa906a352e6738d08f116f89b 2008.0/x86_64/lib64poppler-glib2-0.6-3.5mdv2008.0.x86_64.rpm 43d6a85dfdad7e969655ee4e2a377370 2008.0/x86_64/lib64poppler-glib-devel-0.6-3.5mdv2008.0.x86_64.rpm eef29dde4b9e80d4c360e953cbe9110b 2008.0/x86_64/lib64poppler-qt2-0.6-3.5mdv2008.0.x86_64.rpm c74dc9f245091f451441d8b88f0beed3 2008.0/x86_64/lib64poppler-qt4-2-0.6-3.5mdv2008.0.x86_64.rpm 60345458274afc6ff480317fc408ec52 2008.0/x86_64/lib64poppler-qt4-devel-0.6-3.5mdv2008.0.x86_64.rpm 0a880b9c0d655c10f5757882e30911f1 2008.0/x86_64/lib64poppler-qt-devel-0.6-3.5mdv2008.0.x86_64.rpm eb6fde793ac0d7ea86df42aa22637807 2008.0/x86_64/php-cups-1.3.10-0.1mdv2008.0.x86_64.rpm 7f475f07368ed9158008f2891dce2cd6 2008.0/x86_64/poppler-0.6-3.5mdv2008.0.x86_64.rpm f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLHXsgmqjQ0CJFipgRAu1fAKCINX1H5StX89GjMDWzGrEM1UiHeACeMLSY a3mQtrfvoibfn29OFAfdSn0= =lTbL -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.61

sources: NVD: CVE-2009-0791 // JVNDB: JVNDB-2009-001734 // BID: 35195 // VULHUB: VHN-38237 // VULMON: CVE-2009-0791 // PACKETSTORM: 83975 // PACKETSTORM: 82086 // PACKETSTORM: 82088 // PACKETSTORM: 83707 // PACKETSTORM: 82087 // PACKETSTORM: 83554

AFFECTED PRODUCTS

vendor:applemodel:cupsscope:eqversion:1.1.22

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.1.17

Trust: 1.6

vendor:applemodel:cupsscope:eqversion:1.3.7

Trust: 1.6

vendor:cupsmodel:cupsscope:eqversion:1.1.17

Trust: 0.8

vendor:cupsmodel:cupsscope:eqversion:1.1.22

Trust: 0.8

vendor:cupsmodel:cupsscope:eqversion:1.3.7

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel optional productivity applicationsscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel optional productivity applications eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:susemodel:linux enterprise server sp3scope:eqversion:9

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.9

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.8

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.7

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.6

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.2

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.1.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.1

Trust: 0.3

vendor:kdemodel:bscope:eqversion:3.0.5

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.0.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.5

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.4

Trust: 0.3

vendor:kdemodel:ascope:eqversion:3.0.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.3

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.2

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0.1

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:3.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.22

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.21

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.20

Trust: 0.3

vendor:easymodel:software products cups rc5scope:eqversion:1.1.19

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.19

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.18

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.17

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

sources: BID: 35195 // JVNDB: JVNDB-2009-001734 // CNNVD: CNNVD-200906-119 // NVD: CVE-2009-0791

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0791
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-0791
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200906-119
value: MEDIUM

Trust: 0.6

VULHUB: VHN-38237
value: MEDIUM

Trust: 0.1

VULMON: CVE-2009-0791
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-0791
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-38237
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38237 // VULMON: CVE-2009-0791 // JVNDB: JVNDB-2009-001734 // CNNVD: CNNVD-200906-119 // NVD: CVE-2009-0791

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-38237 // JVNDB: JVNDB-2009-001734 // NVD: CVE-2009-0791

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-119

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200906-119

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001734

PATCH

title:kdegraphics-3.5.5-3.5AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=766

Trust: 0.8

title:tetex-3.0-33.8.5.0.1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1040

Trust: 0.8

title:Top Pageurl:http://www.cups.org/

Trust: 0.8

title:1803url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1803

Trust: 0.8

title:2060url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2060

Trust: 0.8

title:1805url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1805

Trust: 0.8

title:1729url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1729

Trust: 0.8

title:2059url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2059

Trust: 0.8

title:RHSA-2010:0399url:https://rhn.redhat.com/errata/RHSA-2010-0399.html

Trust: 0.8

title:RHSA-2009:1503url:https://rhn.redhat.com/errata/RHSA-2009-1503.html

Trust: 0.8

title:RHSA-2010:0400url:https://rhn.redhat.com/errata/RHSA-2010-0400.html

Trust: 0.8

title:RHSA-2009:1500url:https://rhn.redhat.com/errata/RHSA-2009-1500.html

Trust: 0.8

title:RHSA-2010:0401url:https://rhn.redhat.com/errata/RHSA-2010-0401.html

Trust: 0.8

title:RHSA-2009:1501url:https://rhn.redhat.com/errata/RHSA-2009-1501.html

Trust: 0.8

title:RHSA-2009:1502url:https://rhn.redhat.com/errata/RHSA-2009-1502.html

Trust: 0.8

title:RHSA-2009:1512url:https://rhn.redhat.com/errata/RHSA-2009-1512.html

Trust: 0.8

title:RHSA-2009:1083url:https://rhn.redhat.com/errata/RHSA-2009-1083.html

Trust: 0.8

title:RHSA-2009:1512url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1512J.html

Trust: 0.8

title:RHSA-2009:1083url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1083J.html

Trust: 0.8

title:RHSA-2009:1503url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1503J.html

Trust: 0.8

title:RHSA-2009:1500url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1500J.html

Trust: 0.8

title:RHSA-2009:1501url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1501J.html

Trust: 0.8

title:RHSA-2009:1502url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1502J.html

Trust: 0.8

title:XPDF Fixes for digital error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=223675

Trust: 0.6

title:Red Hat: Important: cups security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20091083 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: cupsys: CVE-2009-0791 integer overflow vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=22c7db924de15c5764c0ff045606eb1e

Trust: 0.1

title:Red Hat: Important: poppler security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20090480 - Security Advisory

Trust: 0.1

title:CVE-T4PDF Table of contents List of CVEs List of Techniquesurl:https://github.com/0xCyberY/CVE-T4PDF

Trust: 0.1

sources: VULMON: CVE-2009-0791 // JVNDB: JVNDB-2009-001734 // CNNVD: CNNVD-200906-119

EXTERNAL IDS

db:NVDid:CVE-2009-0791

Trust: 3.5

db:BIDid:35195

Trust: 2.9

db:SECUNIAid:35340

Trust: 2.6

db:SECTRACKid:1022326

Trust: 2.6

db:VUPENid:ADV-2009-1488

Trust: 2.6

db:SECUNIAid:37037

Trust: 1.8

db:SECUNIAid:35685

Trust: 1.8

db:SECUNIAid:37023

Trust: 1.8

db:SECUNIAid:37043

Trust: 1.8

db:SECUNIAid:37028

Trust: 1.8

db:SECUNIAid:37079

Trust: 1.8

db:SECUNIAid:37077

Trust: 1.8

db:VUPENid:ADV-2009-2928

Trust: 1.8

db:XFid:50941

Trust: 0.8

db:JVNDBid:JVNDB-2009-001734

Trust: 0.8

db:CNNVDid:CNNVD-200906-119

Trust: 0.6

db:PACKETSTORMid:83975

Trust: 0.2

db:VULHUBid:VHN-38237

Trust: 0.1

db:VULMONid:CVE-2009-0791

Trust: 0.1

db:PACKETSTORMid:82086

Trust: 0.1

db:PACKETSTORMid:82088

Trust: 0.1

db:PACKETSTORMid:83707

Trust: 0.1

db:PACKETSTORMid:82087

Trust: 0.1

db:PACKETSTORMid:83554

Trust: 0.1

sources: VULHUB: VHN-38237 // VULMON: CVE-2009-0791 // BID: 35195 // JVNDB: JVNDB-2009-001734 // PACKETSTORM: 83975 // PACKETSTORM: 82086 // PACKETSTORM: 82088 // PACKETSTORM: 83707 // PACKETSTORM: 82087 // PACKETSTORM: 83554 // CNNVD: CNNVD-200906-119 // NVD: CVE-2009-0791

REFERENCES

url:http://securitytracker.com/id?1022326

Trust: 2.6

url:http://www.securityfocus.com/bid/35195

Trust: 2.6

url:http://secunia.com/advisories/35340

Trust: 2.6

url:http://www.vupen.com/english/advisories/2009/1488

Trust: 2.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=491840

Trust: 2.1

url:http://secunia.com/advisories/35685

Trust: 1.8

url:http://secunia.com/advisories/37023

Trust: 1.8

url:http://secunia.com/advisories/37028

Trust: 1.8

url:http://secunia.com/advisories/37037

Trust: 1.8

url:http://secunia.com/advisories/37043

Trust: 1.8

url:http://secunia.com/advisories/37077

Trust: 1.8

url:http://secunia.com/advisories/37079

Trust: 1.8

url:http://www.vupen.com/english/advisories/2009/2928

Trust: 1.8

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:334

Trust: 1.8

url:http://www.redhat.com/support/errata/rhsa-2009-1083.html

Trust: 1.8

url:https://rhn.redhat.com/errata/rhsa-2009-1500.html

Trust: 1.8

url:https://rhn.redhat.com/errata/rhsa-2009-1501.html

Trust: 1.8

url:https://rhn.redhat.com/errata/rhsa-2009-1502.html

Trust: 1.8

url:https://rhn.redhat.com/errata/rhsa-2009-1503.html

Trust: 1.8

url:https://rhn.redhat.com/errata/rhsa-2009-1512.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50941

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10534

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0791

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/50941

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0791

Trust: 0.8

url:https://access.redhat.com/errata/rhsa-2009:1083

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2009-0791

Trust: 0.6

url:http://www.mandriva.com/security/

Trust: 0.6

url:http://www.mandriva.com/security/advisories

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:0480

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:1501

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:1500

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2010:0400

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2010:0401

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:1503

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:1502

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2009-0791

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2009:1512

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2010:0399

Trust: 0.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3609

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-3609

Trust: 0.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3608

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-3608

Trust: 0.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0147

Trust: 0.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0166

Trust: 0.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0146

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-0166

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-0147

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2009-0146

Trust: 0.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0163

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-0163

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0949

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-0949

Trust: 0.4

url:http://support.avaya.com/elmodocs2/security/asa-2009-227.htm

Trust: 0.3

url:http://www.cups.org

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0165

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0165

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1180

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1179

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1182

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1181

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0800

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0799

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0195

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0799

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1180

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1183

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1182

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-0800

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1181

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0195

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1179

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1183

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/189.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/0xcybery/cve-t4pdf

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3605

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3605

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1196

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0945

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0945

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

sources: VULHUB: VHN-38237 // VULMON: CVE-2009-0791 // BID: 35195 // JVNDB: JVNDB-2009-001734 // PACKETSTORM: 83975 // PACKETSTORM: 82086 // PACKETSTORM: 82088 // PACKETSTORM: 83707 // PACKETSTORM: 82087 // PACKETSTORM: 83554 // CNNVD: CNNVD-200906-119 // NVD: CVE-2009-0791

CREDITS

Mandriva

Trust: 0.6

sources: PACKETSTORM: 83975 // PACKETSTORM: 82086 // PACKETSTORM: 82088 // PACKETSTORM: 83707 // PACKETSTORM: 82087 // PACKETSTORM: 83554

SOURCES

db:VULHUBid:VHN-38237
db:VULMONid:CVE-2009-0791
db:BIDid:35195
db:JVNDBid:JVNDB-2009-001734
db:PACKETSTORMid:83975
db:PACKETSTORMid:82086
db:PACKETSTORMid:82088
db:PACKETSTORMid:83707
db:PACKETSTORMid:82087
db:PACKETSTORMid:83554
db:CNNVDid:CNNVD-200906-119
db:NVDid:CVE-2009-0791

LAST UPDATE DATE

2024-11-23T19:38:15.777000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38237date:2023-02-13T00:00:00
db:VULMONid:CVE-2009-0791date:2023-02-13T00:00:00
db:BIDid:35195date:2015-03-19T09:37:00
db:JVNDBid:JVNDB-2009-001734date:2010-05-26T00:00:00
db:CNNVDid:CNNVD-200906-119date:2023-04-28T00:00:00
db:NVDid:CVE-2009-0791date:2024-11-21T01:00:55.577

SOURCES RELEASE DATE

db:VULHUBid:VHN-38237date:2009-06-09T00:00:00
db:VULMONid:CVE-2009-0791date:2009-06-09T00:00:00
db:BIDid:35195date:2009-06-03T00:00:00
db:JVNDBid:JVNDB-2009-001734date:2009-07-09T00:00:00
db:PACKETSTORMid:83975date:2009-12-17T21:54:15
db:PACKETSTORMid:82086date:2009-10-21T02:32:05
db:PACKETSTORMid:82088date:2009-10-21T03:01:09
db:PACKETSTORMid:83707date:2009-12-11T00:57:14
db:PACKETSTORMid:82087date:2009-10-21T02:57:54
db:PACKETSTORMid:83554date:2009-12-08T01:31:40
db:CNNVDid:CNNVD-200906-119date:2009-06-09T00:00:00
db:NVDid:CVE-2009-0791date:2009-06-09T17:30:00.267