var-200904-0808
Vulnerability from variot

Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg. Xpdf and poppler contain multiple vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Xpdf is an open source viewer for Portable Document Format (PDF) files. (CVE-2009-0165). (CVE-2009-0163)

Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to g*allocn. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-1183)

Two integer overflow flaws were found in the CUPS pdftops filter. An attacker could create a malicious PDF file that would cause pdftops to crash or, potentially, execute arbitrary code as the lp user if the file was printed. (CVE-2009-3608, CVE-2009-3609)

This update corrects the problems.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609


Updated Packages:

Mandriva Linux 2009.0: 5afef470fbd90b1ba91bb3c4ba83d3d9 2009.0/i586/acl-2.2.47-4.1mdv2009.0.i586.rpm f6c458ac101765b7be2b03983f5053e9 2009.0/i586/cups-1.3.10-0.2mdv2009.0.i586.rpm 57e96e7061b8f648555171a54f4de57d 2009.0/i586/cups-common-1.3.10-0.2mdv2009.0.i586.rpm 9ceeca29ea654b5941ce9dc119d77915 2009.0/i586/cups-serial-1.3.10-0.2mdv2009.0.i586.rpm 3de9be03b7c47725cecce48a981623ec 2009.0/i586/libacl1-2.2.47-4.1mdv2009.0.i586.rpm ad812a8c58c3d07c98262df1f3e3f45b 2009.0/i586/libacl-devel-2.2.47-4.1mdv2009.0.i586.rpm 6fddee7c9701335f4b6505ba1a125417 2009.0/i586/libcups2-1.3.10-0.2mdv2009.0.i586.rpm 668ee622e663fef6d458cfc08ac345a3 2009.0/i586/libcups2-devel-1.3.10-0.2mdv2009.0.i586.rpm f02791fa357fd1b11d627184fe6023f9 2009.0/i586/libpoppler3-0.8.7-2.3mdv2009.0.i586.rpm 237284c6152a84eb858256a347250e31 2009.0/i586/libpoppler-devel-0.8.7-2.3mdv2009.0.i586.rpm e6008cb60171a0f2ddbc76a394b87c4b 2009.0/i586/libpoppler-glib3-0.8.7-2.3mdv2009.0.i586.rpm 24755af7d9d2f4dee1c90fc592e9f576 2009.0/i586/libpoppler-glib-devel-0.8.7-2.3mdv2009.0.i586.rpm d7e9ced5a0d7056a27ef2ca3df50188a 2009.0/i586/libpoppler-qt2-0.8.7-2.3mdv2009.0.i586.rpm ddafea6d6ff4be8996d681b50e71360d 2009.0/i586/libpoppler-qt4-3-0.8.7-2.3mdv2009.0.i586.rpm 6debb46b2e51bb9abae8ae224f8db0f1 2009.0/i586/libpoppler-qt4-devel-0.8.7-2.3mdv2009.0.i586.rpm f0fbc61c0e1d631e97f22f6a4d278c70 2009.0/i586/libpoppler-qt-devel-0.8.7-2.3mdv2009.0.i586.rpm ca32c3f529c9a1e676ea8dacc3c6f888 2009.0/i586/php-cups-1.3.10-0.2mdv2009.0.i586.rpm ab5e168e0e4d8e473f45b7a44fb1c8f0 2009.0/i586/poppler-0.8.7-2.3mdv2009.0.i586.rpm 65c09a60591a58ae496b323e0e8fe86a 2009.0/SRPMS/acl-2.2.47-4.1mdv2009.0.src.rpm 089453e069614cf9f4a9b0b81e93706e 2009.0/SRPMS/cups-1.3.10-0.2mdv2009.0.src.rpm be5c0733d2cdd537ac1eea6c995a940f 2009.0/SRPMS/poppler-0.8.7-2.3mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64: a76ac52d03f6f4dc3fe1506801e1e21b 2009.0/x86_64/acl-2.2.47-4.1mdv2009.0.x86_64.rpm 525c24a89bab12d3e15b51b4c97d1358 2009.0/x86_64/cups-1.3.10-0.2mdv2009.0.x86_64.rpm 3571d5eb4f123e668b5adf69e986372b 2009.0/x86_64/cups-common-1.3.10-0.2mdv2009.0.x86_64.rpm b39c9243e550ffc65de2237195bc26a4 2009.0/x86_64/cups-serial-1.3.10-0.2mdv2009.0.x86_64.rpm 2837588f649089d0821304b0805d340c 2009.0/x86_64/lib64acl1-2.2.47-4.1mdv2009.0.x86_64.rpm cdfca8cfad651d282f96d40fd75a4596 2009.0/x86_64/lib64acl-devel-2.2.47-4.1mdv2009.0.x86_64.rpm f6af0d4a008cfef6ee33d57e0d968833 2009.0/x86_64/lib64cups2-1.3.10-0.2mdv2009.0.x86_64.rpm 5b60fff9db65f33fef1e8b279d27297f 2009.0/x86_64/lib64cups2-devel-1.3.10-0.2mdv2009.0.x86_64.rpm aae343ba528a86feb7f4f4ea958e6830 2009.0/x86_64/lib64poppler3-0.8.7-2.3mdv2009.0.x86_64.rpm de8da0007d86c8331ab187f03f07f57b 2009.0/x86_64/lib64poppler-devel-0.8.7-2.3mdv2009.0.x86_64.rpm 3dde1055871d4ac1dad4a66017fd0b0a 2009.0/x86_64/lib64poppler-glib3-0.8.7-2.3mdv2009.0.x86_64.rpm 8ccbbd75f41f86c803eb9ccdca254d4c 2009.0/x86_64/lib64poppler-glib-devel-0.8.7-2.3mdv2009.0.x86_64.rpm a1daabbf13cded9a785d62f088c76661 2009.0/x86_64/lib64poppler-qt2-0.8.7-2.3mdv2009.0.x86_64.rpm a2d283827fd14321ab42c8eda701b7f2 2009.0/x86_64/lib64poppler-qt4-3-0.8.7-2.3mdv2009.0.x86_64.rpm 9e2f0f9b23c1365a0b1d49254aab3199 2009.0/x86_64/lib64poppler-qt4-devel-0.8.7-2.3mdv2009.0.x86_64.rpm bb32350e6a9ee7a7be1b3562ed1282fc 2009.0/x86_64/lib64poppler-qt-devel-0.8.7-2.3mdv2009.0.x86_64.rpm cb750cc3313fdb7f045c85aa186735d5 2009.0/x86_64/php-cups-1.3.10-0.2mdv2009.0.x86_64.rpm 8882c7aef8572a7342db51dca0d0f444 2009.0/x86_64/poppler-0.8.7-2.3mdv2009.0.x86_64.rpm 65c09a60591a58ae496b323e0e8fe86a 2009.0/SRPMS/acl-2.2.47-4.1mdv2009.0.src.rpm 089453e069614cf9f4a9b0b81e93706e 2009.0/SRPMS/cups-1.3.10-0.2mdv2009.0.src.rpm be5c0733d2cdd537ac1eea6c995a940f 2009.0/SRPMS/poppler-0.8.7-2.3mdv2009.0.src.rpm

Mandriva Enterprise Server 5: 3d022011977e4a10551f4a56251ce5fa mes5/i586/acl-2.2.47-4.1mdvmes5.i586.rpm c29a689a2db186046756a9e5e2c0a8f3 mes5/i586/cups-1.3.10-0.2mdvmes5.i586.rpm 36e0bdd3bbf5e634b55d4694380c84dc mes5/i586/cups-common-1.3.10-0.2mdvmes5.i586.rpm 00c15febde2ad95d12d7635661d47945 mes5/i586/cups-serial-1.3.10-0.2mdvmes5.i586.rpm f4df21360fd911b246a12c1848e53581 mes5/i586/libacl1-2.2.47-4.1mdvmes5.i586.rpm 8aea7eac71eac4b9149d80b4218af3c2 mes5/i586/libacl-devel-2.2.47-4.1mdvmes5.i586.rpm 2e9611bb9cefdb97750fe45670996543 mes5/i586/libcups2-1.3.10-0.2mdvmes5.i586.rpm 1303d2339e5f85a9051385c6c1477e3b mes5/i586/libcups2-devel-1.3.10-0.2mdvmes5.i586.rpm 5ffb04e2aeb3d81c715d321ca7f6493d mes5/i586/libopenslp1-1.2.1-8.1mdvmes5.i586.rpm 5de6f8ac79499f879c2595c91233bbf3 mes5/i586/libopenslp1-devel-1.2.1-8.1mdvmes5.i586.rpm 8bb39d8ce2ad2d4709918445815208fc mes5/i586/libpoppler3-0.8.7-2.3mdvmes5.i586.rpm 0e8f25804f2159b90fdd8e7095131588 mes5/i586/libpoppler-devel-0.8.7-2.3mdvmes5.i586.rpm 9ebc1e0b9b3c82859d739493a858cae9 mes5/i586/libpoppler-glib3-0.8.7-2.3mdvmes5.i586.rpm 51e64a439af77b2312767f7d644a6a4f mes5/i586/libpoppler-glib-devel-0.8.7-2.3mdvmes5.i586.rpm 7c704efde4af7a2a210b5bccd2fedea2 mes5/i586/libpoppler-qt2-0.8.7-2.3mdvmes5.i586.rpm ebfbf333cc37cb01a069228b6f4239b9 mes5/i586/libpoppler-qt4-3-0.8.7-2.3mdvmes5.i586.rpm 308efdd8971843a2d2d62e5259deb313 mes5/i586/libpoppler-qt4-devel-0.8.7-2.3mdvmes5.i586.rpm b8ef53aed48f4495abbda78f967c6b03 mes5/i586/libpoppler-qt-devel-0.8.7-2.3mdvmes5.i586.rpm 41dbe03f2d9348e06e3ba8e3d1f26cc9 mes5/i586/openslp-1.2.1-8.1mdvmes5.i586.rpm 4a30887d3b5cfbe996f6216dfd2af9de mes5/i586/php-cups-1.3.10-0.2mdvmes5.i586.rpm e99f800df740a1104f2e55e454dba0e2 mes5/i586/poppler-0.8.7-2.3mdvmes5.i586.rpm 635e5f08f9bd9bcf938c7e6acc2bcd40 mes5/SRPMS/acl-2.2.47-4.1mdvmes5.src.rpm 45443396fd1b86d7d305d203f058d4f6 mes5/SRPMS/cups-1.3.10-0.2mdvmes5.src.rpm 3f7d68de39f4e1eed0c6095db6c69837 mes5/SRPMS/openslp-1.2.1-8.1mdvmes5.src.rpm 6b77ace4f59963baf78a0ba041070cfe mes5/SRPMS/poppler-0.8.7-2.3mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64: 3d95d16026af177290e0cea353da380c mes5/x86_64/acl-2.2.47-4.1mdvmes5.x86_64.rpm cb71f3f8b76b599d72fa15930ead4194 mes5/x86_64/cups-1.3.10-0.2mdvmes5.x86_64.rpm c3580a98d4248e4746d1021800916675 mes5/x86_64/cups-common-1.3.10-0.2mdvmes5.x86_64.rpm 39c78f07835385585189c4c984eeb86c mes5/x86_64/cups-serial-1.3.10-0.2mdvmes5.x86_64.rpm b78b05598b1ddd50a0d5ffc1e63a9d5f mes5/x86_64/lib64acl1-2.2.47-4.1mdvmes5.x86_64.rpm 10eb04184447f9a76052a4c57d99f7ab mes5/x86_64/lib64acl-devel-2.2.47-4.1mdvmes5.x86_64.rpm 0696874c98c99972866e26d90ee38d6f mes5/x86_64/lib64cups2-1.3.10-0.2mdvmes5.x86_64.rpm 4bd0ea0f775617400ce40b1c4f957603 mes5/x86_64/lib64cups2-devel-1.3.10-0.2mdvmes5.x86_64.rpm 7e545a67886d3a94f173b84531694cca mes5/x86_64/lib64openslp1-1.2.1-8.1mdvmes5.x86_64.rpm a084b392e3db81f7f7ba9886dc745a67 mes5/x86_64/lib64openslp1-devel-1.2.1-8.1mdvmes5.x86_64.rpm a91173c222b22c42775e545bcd728a74 mes5/x86_64/lib64poppler3-0.8.7-2.3mdvmes5.x86_64.rpm 8b3196f11e5acded6268e8a3e5e2a855 mes5/x86_64/lib64poppler-devel-0.8.7-2.3mdvmes5.x86_64.rpm d805bec2817b0479c45aa54fe36a4c06 mes5/x86_64/lib64poppler-glib3-0.8.7-2.3mdvmes5.x86_64.rpm a5385b959453bfe0cd9f86083866dc18 mes5/x86_64/lib64poppler-glib-devel-0.8.7-2.3mdvmes5.x86_64.rpm 36bd4a56b2e0e681433f37bd06a10a81 mes5/x86_64/lib64poppler-qt2-0.8.7-2.3mdvmes5.x86_64.rpm 237b15170b5066ac55f8a8b4327b80bb mes5/x86_64/lib64poppler-qt4-3-0.8.7-2.3mdvmes5.x86_64.rpm 06c3a86abdac6e1eeda86f916fe06026 mes5/x86_64/lib64poppler-qt4-devel-0.8.7-2.3mdvmes5.x86_64.rpm b5b086ecfbe4629ef2ab3d2d5472d655 mes5/x86_64/lib64poppler-qt-devel-0.8.7-2.3mdvmes5.x86_64.rpm 790c7f128775137459a5d406ddc05c8b mes5/x86_64/openslp-1.2.1-8.1mdvmes5.x86_64.rpm f21671c76a063dfd784ef9afa363777e mes5/x86_64/php-cups-1.3.10-0.2mdvmes5.x86_64.rpm 39d5d335a1564962ac7868c53a2cb2a5 mes5/x86_64/poppler-0.8.7-2.3mdvmes5.x86_64.rpm 635e5f08f9bd9bcf938c7e6acc2bcd40 mes5/SRPMS/acl-2.2.47-4.1mdvmes5.src.rpm 45443396fd1b86d7d305d203f058d4f6 mes5/SRPMS/cups-1.3.10-0.2mdvmes5.src.rpm 3f7d68de39f4e1eed0c6095db6c69837 mes5/SRPMS/openslp-1.2.1-8.1mdvmes5.src.rpm 6b77ace4f59963baf78a0ba041070cfe mes5/SRPMS/poppler-0.8.7-2.3mdvmes5.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFK3N0BmqjQ0CJFipgRAvcCAJ4hYpfRAN3/ki8VBji+B/PMrRZlUwCgqkiE kgmoMK5ov330kU4qfIGFxlM= =aISl -----END PGP SIGNATURE----- .

For the old stable distribution (etch), these problems have been fixed in version 3.01-9.1+etch6.

For the stable distribution (lenny), these problems have been fixed in version 3.02-1.4+lenny1.

For the unstable distribution (sid), these problems will be fixed in a forthcoming version.

We recommend that you upgrade your xpdf packages.

Upgrade instructions


wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch


Debian GNU/Linux 5.0 alias lenny


Debian (oldstable)


Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.dsc Size/MD5 checksum: 974 9c04059981f8b036d7e6e39c7f0aeb21 http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.diff.gz Size/MD5 checksum: 46835 c69a67b9ff487403e7c3ff819c6ff734 http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01.orig.tar.gz Size/MD5 checksum: 599778 e004c69c7dddef165d768b1362b44268

Architecture independent packages:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.01-9.1+etch6_all.deb Size/MD5 checksum: 62834 dd8f37161c3b2430cb1cd65c911e9f86 http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6_all.deb Size/MD5 checksum: 1278 d6da8e00b02ab3f17ec44b90fff6bb30

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_alpha.deb Size/MD5 checksum: 920352 83b7d74d9ebae9b26da91de7c91d3502 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_alpha.deb Size/MD5 checksum: 1687294 9862913548fff9bfda37a6fe075df5b0

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_amd64.deb Size/MD5 checksum: 809202 171520d7642019943bfe7166876f5da5 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_amd64.deb Size/MD5 checksum: 1493308 9575f135e9ec312f9e6d7d2517dd8f5b

arm architecture (ARM)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_arm.deb Size/MD5 checksum: 803714 6db06ffcba7f6d7576ed356e7989557d http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_arm.deb Size/MD5 checksum: 1468616 9afde01dda379acd4e7edfbccc7c7b2d

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_hppa.deb Size/MD5 checksum: 1773794 c9012a9d3919ec40dcea1264ac27a6fe http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_hppa.deb Size/MD5 checksum: 963060 565daaf6f15ff7593d560ef7a2f94364

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_i386.deb Size/MD5 checksum: 796992 5270bef04f1c2e924b813dffe6050d89 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_i386.deb Size/MD5 checksum: 1458826 b2f3cbaac0ffcce0bb8d7e656bf11b02

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_ia64.deb Size/MD5 checksum: 1217142 afeaf9bfc66ebb69767703bfb30bbd4c http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_ia64.deb Size/MD5 checksum: 2218472 6545e9b6f58a84c0daa76baa8a0db629

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_mipsel.deb Size/MD5 checksum: 946638 5323268be89e54c5c8eb7ae13f0eab14 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_mipsel.deb Size/MD5 checksum: 1721268 0b710c0bcc6ffefe29f683ab09d3cbe8

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_powerpc.deb Size/MD5 checksum: 1554798 eadd6236b778761086d436dd8db986e4 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_powerpc.deb Size/MD5 checksum: 849204 d22f5d59f03d6484e149d7536a25a517

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_s390.deb Size/MD5 checksum: 1401814 0e3f588c64e8fa9a102ebcae29c4d807 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_s390.deb Size/MD5 checksum: 767392 4b7c1a868f2f909c2dce25087da77817

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_sparc.deb Size/MD5 checksum: 1394680 8b17e2339e2a908a610271eb678495b1 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_sparc.deb Size/MD5 checksum: 763618 f3897333018702ee926e41ca5f58dc92

Debian (stable)


Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.dsc Size/MD5 checksum: 1266 faeebc4dfc74129ca708a6345bb483f7 http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02.orig.tar.gz Size/MD5 checksum: 674912 599dc4cc65a07ee868cf92a667a913d2 http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.diff.gz Size/MD5 checksum: 42280 362f72e95494f51a19eeb898b9a527ac

Architecture independent packages:

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.02-1.4+lenny1_all.deb Size/MD5 checksum: 67664 b5f063bf32cbeaf1aaeec315dc8aff0a http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1_all.deb Size/MD5 checksum: 1268 f67780458dac3c38cd59bfde186f9a3b

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_alpha.deb Size/MD5 checksum: 1896344 f65f591413c25a23ea2aaccba2b5b634 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_alpha.deb Size/MD5 checksum: 1018434 cb679c93bbc428ea852bd4ef3103e42d

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_amd64.deb Size/MD5 checksum: 1709514 1e1277251a6dd0bb0a551997efd39175 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_amd64.deb Size/MD5 checksum: 921892 fb7de1db5e3885365c3ad74c3646ab57

arm architecture (ARM)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_arm.deb Size/MD5 checksum: 1667088 58ddefe40598d6fe4a5016145163ef45 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_arm.deb Size/MD5 checksum: 907908 881594298fe547cefa3d528c519d369f

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_armel.deb Size/MD5 checksum: 886242 51d55f7c4de41c5d4051f41fde9b7389 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_armel.deb Size/MD5 checksum: 1602392 bc996edfad6d1995cb4ef2f4c7760b51

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_hppa.deb Size/MD5 checksum: 1076286 fa3ac4a1001abf3e892bb1397b06ff17 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_hppa.deb Size/MD5 checksum: 1985520 e95263d094e2c8d6aa72ee1edb9105f3

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_i386.deb Size/MD5 checksum: 876656 441042932886fa29adae731338f6b5bd http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_i386.deb Size/MD5 checksum: 1611730 52516381da25dbb0c1145e2b7cdf692a

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_ia64.deb Size/MD5 checksum: 1380222 0ffaee560534c9d69df433340679c8fc http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_ia64.deb Size/MD5 checksum: 2519970 eb4f4e5c173557fa8ae713f123cbb193

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mips.deb Size/MD5 checksum: 1894924 58b336b114ef5c8fb9fc6244411b4cf4 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mips.deb Size/MD5 checksum: 1040834 ae8ed06ea2ed07e3a064c6bd28e80933

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mipsel.deb Size/MD5 checksum: 1026954 eac8167230b8fa208cdbc5b196f0c624 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mipsel.deb Size/MD5 checksum: 1872050 8f2e99ce5a102d099ba22543f246d5bd

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_powerpc.deb Size/MD5 checksum: 1788584 7d1466cc8770bd92f299c1cc772f64e7 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_powerpc.deb Size/MD5 checksum: 968838 7cc8568d6b74348300066e42b27f90c2

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_s390.deb Size/MD5 checksum: 871666 1dde93a4cc0a28b90f92c05f0d181079 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_s390.deb Size/MD5 checksum: 1598270 201ad07e4853843dce22f22daa41fd35

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_sparc.deb Size/MD5 checksum: 863662 446f2d8fe6483d3741648c4db1ff5b82 http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_sparc.deb Size/MD5 checksum: 1586262 52861c00f406c35db8a6e6f3269cc37d

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKAJvfYrVLjBFATsMRAvL3AJ48hk1Vsp4ZvDGoQfwOunErKHxElQCfepN+ rFYyqIcPRzz8zBGVGObkTr8= =xhzW -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200904-0808",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.5a"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.12"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.18"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.3"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.3"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.7"
      },
      {
        "model": "cups",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.9"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.5-1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.2"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "1.01"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "3.00"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.0"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.91b"
      },
      {
        "model": "xpdfreader",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "3.02"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.6-2"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.90"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.6"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.5"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.92e"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.91a"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.5-2"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.92c"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.1"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.93c"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.5"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.11"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "2.00"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.17"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.5"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.9"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.14"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.92b"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "1.00"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.6"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.4"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "2.01"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.2"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.21"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.8"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.10"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.91"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "1.00a"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.7"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.7"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.22"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.0"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.15"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.13"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.92a"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.10-1"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.93a"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.92d"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.2"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.92"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.4"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.9"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.8"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.6-1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.5"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.20"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.4"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.80"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "3.01"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.10"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.6"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.6"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.6-3"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.8"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.10"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.12"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.7"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "2.02"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.9-1"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.19"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.93"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.7a"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.11"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.2"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "2.03"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.91c"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.3.11"
      },
      {
        "model": "xpdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "foolabs",
        "version": "0.93b"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.16"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.1.23"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.3"
      },
      {
        "model": "xpdfreader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "glyphandcog",
        "version": "0.4"
      },
      {
        "model": "cups",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "1.2.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandriva s a",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "novell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "poppler",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "research in motion rim",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ubuntu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xpdf",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mandriva",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2009-0146",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-0146",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CARNEGIE MELLON",
            "availabilityImpact": "PARTIAL",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 9.0,
            "collateralDamagePotential": "NOT DEFINED",
            "confidentialityImpact": "COMPLETE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 7.0,
            "exploitability": "PROOF-OF-CONCEPT",
            "exploitabilityScore": 8.6,
            "id": "VU#196617",
            "impactScore": 9.5,
            "integrityImpact": "COMPLETE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "HIGH",
            "targetDistribution": "NOT DEFINED",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-37592",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-0146",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#196617",
            "trust": 0.8,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-37592",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg. Xpdf and poppler contain multiple vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Xpdf is an open source viewer for Portable Document Format (PDF) files. (CVE-2009-0165). (CVE-2009-0163)\n \n Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier,\n as used in Poppler and other products, when running on Mac OS X,\n has unspecified impact, related to g*allocn. NOTE:\n the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-1183)\n \n Two integer overflow flaws were found in the CUPS pdftops filter. An\n attacker could create a malicious PDF file that would cause pdftops\n to crash or, potentially, execute arbitrary code as the lp user if\n the file was printed. (CVE-2009-3608, CVE-2009-3609)\n \n This update corrects the problems. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2009.0:\n 5afef470fbd90b1ba91bb3c4ba83d3d9  2009.0/i586/acl-2.2.47-4.1mdv2009.0.i586.rpm\n f6c458ac101765b7be2b03983f5053e9  2009.0/i586/cups-1.3.10-0.2mdv2009.0.i586.rpm\n 57e96e7061b8f648555171a54f4de57d  2009.0/i586/cups-common-1.3.10-0.2mdv2009.0.i586.rpm\n 9ceeca29ea654b5941ce9dc119d77915  2009.0/i586/cups-serial-1.3.10-0.2mdv2009.0.i586.rpm\n 3de9be03b7c47725cecce48a981623ec  2009.0/i586/libacl1-2.2.47-4.1mdv2009.0.i586.rpm\n ad812a8c58c3d07c98262df1f3e3f45b  2009.0/i586/libacl-devel-2.2.47-4.1mdv2009.0.i586.rpm\n 6fddee7c9701335f4b6505ba1a125417  2009.0/i586/libcups2-1.3.10-0.2mdv2009.0.i586.rpm\n 668ee622e663fef6d458cfc08ac345a3  2009.0/i586/libcups2-devel-1.3.10-0.2mdv2009.0.i586.rpm\n f02791fa357fd1b11d627184fe6023f9  2009.0/i586/libpoppler3-0.8.7-2.3mdv2009.0.i586.rpm\n 237284c6152a84eb858256a347250e31  2009.0/i586/libpoppler-devel-0.8.7-2.3mdv2009.0.i586.rpm\n e6008cb60171a0f2ddbc76a394b87c4b  2009.0/i586/libpoppler-glib3-0.8.7-2.3mdv2009.0.i586.rpm\n 24755af7d9d2f4dee1c90fc592e9f576  2009.0/i586/libpoppler-glib-devel-0.8.7-2.3mdv2009.0.i586.rpm\n d7e9ced5a0d7056a27ef2ca3df50188a  2009.0/i586/libpoppler-qt2-0.8.7-2.3mdv2009.0.i586.rpm\n ddafea6d6ff4be8996d681b50e71360d  2009.0/i586/libpoppler-qt4-3-0.8.7-2.3mdv2009.0.i586.rpm\n 6debb46b2e51bb9abae8ae224f8db0f1  2009.0/i586/libpoppler-qt4-devel-0.8.7-2.3mdv2009.0.i586.rpm\n f0fbc61c0e1d631e97f22f6a4d278c70  2009.0/i586/libpoppler-qt-devel-0.8.7-2.3mdv2009.0.i586.rpm\n ca32c3f529c9a1e676ea8dacc3c6f888  2009.0/i586/php-cups-1.3.10-0.2mdv2009.0.i586.rpm\n ab5e168e0e4d8e473f45b7a44fb1c8f0  2009.0/i586/poppler-0.8.7-2.3mdv2009.0.i586.rpm \n 65c09a60591a58ae496b323e0e8fe86a  2009.0/SRPMS/acl-2.2.47-4.1mdv2009.0.src.rpm\n 089453e069614cf9f4a9b0b81e93706e  2009.0/SRPMS/cups-1.3.10-0.2mdv2009.0.src.rpm\n be5c0733d2cdd537ac1eea6c995a940f  2009.0/SRPMS/poppler-0.8.7-2.3mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n a76ac52d03f6f4dc3fe1506801e1e21b  2009.0/x86_64/acl-2.2.47-4.1mdv2009.0.x86_64.rpm\n 525c24a89bab12d3e15b51b4c97d1358  2009.0/x86_64/cups-1.3.10-0.2mdv2009.0.x86_64.rpm\n 3571d5eb4f123e668b5adf69e986372b  2009.0/x86_64/cups-common-1.3.10-0.2mdv2009.0.x86_64.rpm\n b39c9243e550ffc65de2237195bc26a4  2009.0/x86_64/cups-serial-1.3.10-0.2mdv2009.0.x86_64.rpm\n 2837588f649089d0821304b0805d340c  2009.0/x86_64/lib64acl1-2.2.47-4.1mdv2009.0.x86_64.rpm\n cdfca8cfad651d282f96d40fd75a4596  2009.0/x86_64/lib64acl-devel-2.2.47-4.1mdv2009.0.x86_64.rpm\n f6af0d4a008cfef6ee33d57e0d968833  2009.0/x86_64/lib64cups2-1.3.10-0.2mdv2009.0.x86_64.rpm\n 5b60fff9db65f33fef1e8b279d27297f  2009.0/x86_64/lib64cups2-devel-1.3.10-0.2mdv2009.0.x86_64.rpm\n aae343ba528a86feb7f4f4ea958e6830  2009.0/x86_64/lib64poppler3-0.8.7-2.3mdv2009.0.x86_64.rpm\n de8da0007d86c8331ab187f03f07f57b  2009.0/x86_64/lib64poppler-devel-0.8.7-2.3mdv2009.0.x86_64.rpm\n 3dde1055871d4ac1dad4a66017fd0b0a  2009.0/x86_64/lib64poppler-glib3-0.8.7-2.3mdv2009.0.x86_64.rpm\n 8ccbbd75f41f86c803eb9ccdca254d4c  2009.0/x86_64/lib64poppler-glib-devel-0.8.7-2.3mdv2009.0.x86_64.rpm\n a1daabbf13cded9a785d62f088c76661  2009.0/x86_64/lib64poppler-qt2-0.8.7-2.3mdv2009.0.x86_64.rpm\n a2d283827fd14321ab42c8eda701b7f2  2009.0/x86_64/lib64poppler-qt4-3-0.8.7-2.3mdv2009.0.x86_64.rpm\n 9e2f0f9b23c1365a0b1d49254aab3199  2009.0/x86_64/lib64poppler-qt4-devel-0.8.7-2.3mdv2009.0.x86_64.rpm\n bb32350e6a9ee7a7be1b3562ed1282fc  2009.0/x86_64/lib64poppler-qt-devel-0.8.7-2.3mdv2009.0.x86_64.rpm\n cb750cc3313fdb7f045c85aa186735d5  2009.0/x86_64/php-cups-1.3.10-0.2mdv2009.0.x86_64.rpm\n 8882c7aef8572a7342db51dca0d0f444  2009.0/x86_64/poppler-0.8.7-2.3mdv2009.0.x86_64.rpm \n 65c09a60591a58ae496b323e0e8fe86a  2009.0/SRPMS/acl-2.2.47-4.1mdv2009.0.src.rpm\n 089453e069614cf9f4a9b0b81e93706e  2009.0/SRPMS/cups-1.3.10-0.2mdv2009.0.src.rpm\n be5c0733d2cdd537ac1eea6c995a940f  2009.0/SRPMS/poppler-0.8.7-2.3mdv2009.0.src.rpm\n\n Mandriva Enterprise Server 5:\n 3d022011977e4a10551f4a56251ce5fa  mes5/i586/acl-2.2.47-4.1mdvmes5.i586.rpm\n c29a689a2db186046756a9e5e2c0a8f3  mes5/i586/cups-1.3.10-0.2mdvmes5.i586.rpm\n 36e0bdd3bbf5e634b55d4694380c84dc  mes5/i586/cups-common-1.3.10-0.2mdvmes5.i586.rpm\n 00c15febde2ad95d12d7635661d47945  mes5/i586/cups-serial-1.3.10-0.2mdvmes5.i586.rpm\n f4df21360fd911b246a12c1848e53581  mes5/i586/libacl1-2.2.47-4.1mdvmes5.i586.rpm\n 8aea7eac71eac4b9149d80b4218af3c2  mes5/i586/libacl-devel-2.2.47-4.1mdvmes5.i586.rpm\n 2e9611bb9cefdb97750fe45670996543  mes5/i586/libcups2-1.3.10-0.2mdvmes5.i586.rpm\n 1303d2339e5f85a9051385c6c1477e3b  mes5/i586/libcups2-devel-1.3.10-0.2mdvmes5.i586.rpm\n 5ffb04e2aeb3d81c715d321ca7f6493d  mes5/i586/libopenslp1-1.2.1-8.1mdvmes5.i586.rpm\n 5de6f8ac79499f879c2595c91233bbf3  mes5/i586/libopenslp1-devel-1.2.1-8.1mdvmes5.i586.rpm\n 8bb39d8ce2ad2d4709918445815208fc  mes5/i586/libpoppler3-0.8.7-2.3mdvmes5.i586.rpm\n 0e8f25804f2159b90fdd8e7095131588  mes5/i586/libpoppler-devel-0.8.7-2.3mdvmes5.i586.rpm\n 9ebc1e0b9b3c82859d739493a858cae9  mes5/i586/libpoppler-glib3-0.8.7-2.3mdvmes5.i586.rpm\n 51e64a439af77b2312767f7d644a6a4f  mes5/i586/libpoppler-glib-devel-0.8.7-2.3mdvmes5.i586.rpm\n 7c704efde4af7a2a210b5bccd2fedea2  mes5/i586/libpoppler-qt2-0.8.7-2.3mdvmes5.i586.rpm\n ebfbf333cc37cb01a069228b6f4239b9  mes5/i586/libpoppler-qt4-3-0.8.7-2.3mdvmes5.i586.rpm\n 308efdd8971843a2d2d62e5259deb313  mes5/i586/libpoppler-qt4-devel-0.8.7-2.3mdvmes5.i586.rpm\n b8ef53aed48f4495abbda78f967c6b03  mes5/i586/libpoppler-qt-devel-0.8.7-2.3mdvmes5.i586.rpm\n 41dbe03f2d9348e06e3ba8e3d1f26cc9  mes5/i586/openslp-1.2.1-8.1mdvmes5.i586.rpm\n 4a30887d3b5cfbe996f6216dfd2af9de  mes5/i586/php-cups-1.3.10-0.2mdvmes5.i586.rpm\n e99f800df740a1104f2e55e454dba0e2  mes5/i586/poppler-0.8.7-2.3mdvmes5.i586.rpm \n 635e5f08f9bd9bcf938c7e6acc2bcd40  mes5/SRPMS/acl-2.2.47-4.1mdvmes5.src.rpm\n 45443396fd1b86d7d305d203f058d4f6  mes5/SRPMS/cups-1.3.10-0.2mdvmes5.src.rpm\n 3f7d68de39f4e1eed0c6095db6c69837  mes5/SRPMS/openslp-1.2.1-8.1mdvmes5.src.rpm\n 6b77ace4f59963baf78a0ba041070cfe  mes5/SRPMS/poppler-0.8.7-2.3mdvmes5.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 3d95d16026af177290e0cea353da380c  mes5/x86_64/acl-2.2.47-4.1mdvmes5.x86_64.rpm\n cb71f3f8b76b599d72fa15930ead4194  mes5/x86_64/cups-1.3.10-0.2mdvmes5.x86_64.rpm\n c3580a98d4248e4746d1021800916675  mes5/x86_64/cups-common-1.3.10-0.2mdvmes5.x86_64.rpm\n 39c78f07835385585189c4c984eeb86c  mes5/x86_64/cups-serial-1.3.10-0.2mdvmes5.x86_64.rpm\n b78b05598b1ddd50a0d5ffc1e63a9d5f  mes5/x86_64/lib64acl1-2.2.47-4.1mdvmes5.x86_64.rpm\n 10eb04184447f9a76052a4c57d99f7ab  mes5/x86_64/lib64acl-devel-2.2.47-4.1mdvmes5.x86_64.rpm\n 0696874c98c99972866e26d90ee38d6f  mes5/x86_64/lib64cups2-1.3.10-0.2mdvmes5.x86_64.rpm\n 4bd0ea0f775617400ce40b1c4f957603  mes5/x86_64/lib64cups2-devel-1.3.10-0.2mdvmes5.x86_64.rpm\n 7e545a67886d3a94f173b84531694cca  mes5/x86_64/lib64openslp1-1.2.1-8.1mdvmes5.x86_64.rpm\n a084b392e3db81f7f7ba9886dc745a67  mes5/x86_64/lib64openslp1-devel-1.2.1-8.1mdvmes5.x86_64.rpm\n a91173c222b22c42775e545bcd728a74  mes5/x86_64/lib64poppler3-0.8.7-2.3mdvmes5.x86_64.rpm\n 8b3196f11e5acded6268e8a3e5e2a855  mes5/x86_64/lib64poppler-devel-0.8.7-2.3mdvmes5.x86_64.rpm\n d805bec2817b0479c45aa54fe36a4c06  mes5/x86_64/lib64poppler-glib3-0.8.7-2.3mdvmes5.x86_64.rpm\n a5385b959453bfe0cd9f86083866dc18  mes5/x86_64/lib64poppler-glib-devel-0.8.7-2.3mdvmes5.x86_64.rpm\n 36bd4a56b2e0e681433f37bd06a10a81  mes5/x86_64/lib64poppler-qt2-0.8.7-2.3mdvmes5.x86_64.rpm\n 237b15170b5066ac55f8a8b4327b80bb  mes5/x86_64/lib64poppler-qt4-3-0.8.7-2.3mdvmes5.x86_64.rpm\n 06c3a86abdac6e1eeda86f916fe06026  mes5/x86_64/lib64poppler-qt4-devel-0.8.7-2.3mdvmes5.x86_64.rpm\n b5b086ecfbe4629ef2ab3d2d5472d655  mes5/x86_64/lib64poppler-qt-devel-0.8.7-2.3mdvmes5.x86_64.rpm\n 790c7f128775137459a5d406ddc05c8b  mes5/x86_64/openslp-1.2.1-8.1mdvmes5.x86_64.rpm\n f21671c76a063dfd784ef9afa363777e  mes5/x86_64/php-cups-1.3.10-0.2mdvmes5.x86_64.rpm\n 39d5d335a1564962ac7868c53a2cb2a5  mes5/x86_64/poppler-0.8.7-2.3mdvmes5.x86_64.rpm \n 635e5f08f9bd9bcf938c7e6acc2bcd40  mes5/SRPMS/acl-2.2.47-4.1mdvmes5.src.rpm\n 45443396fd1b86d7d305d203f058d4f6  mes5/SRPMS/cups-1.3.10-0.2mdvmes5.src.rpm\n 3f7d68de39f4e1eed0c6095db6c69837  mes5/SRPMS/openslp-1.2.1-8.1mdvmes5.src.rpm\n 6b77ace4f59963baf78a0ba041070cfe  mes5/SRPMS/poppler-0.8.7-2.3mdvmes5.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFK3N0BmqjQ0CJFipgRAvcCAJ4hYpfRAN3/ki8VBji+B/PMrRZlUwCgqkiE\nkgmoMK5ov330kU4qfIGFxlM=\n=aISl\n-----END PGP SIGNATURE-----\n. \n\nFor the old stable distribution (etch), these problems have been fixed in version\n3.01-9.1+etch6. \n\nFor the stable distribution (lenny), these problems have been fixed in version\n3.02-1.4+lenny1. \n\nFor the unstable distribution (sid), these problems will be fixed in a\nforthcoming version. \n\nWe recommend that you upgrade your xpdf packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n        will fetch the file for you\ndpkg -i file.deb\n        will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n        will update the internal database\napt-get upgrade\n        will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.dsc\n    Size/MD5 checksum:      974 9c04059981f8b036d7e6e39c7f0aeb21\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.diff.gz\n    Size/MD5 checksum:    46835 c69a67b9ff487403e7c3ff819c6ff734\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01.orig.tar.gz\n    Size/MD5 checksum:   599778 e004c69c7dddef165d768b1362b44268\n\nArchitecture independent packages:\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.01-9.1+etch6_all.deb\n    Size/MD5 checksum:    62834 dd8f37161c3b2430cb1cd65c911e9f86\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6_all.deb\n    Size/MD5 checksum:     1278 d6da8e00b02ab3f17ec44b90fff6bb30\n\nalpha architecture (DEC Alpha)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_alpha.deb\n    Size/MD5 checksum:   920352 83b7d74d9ebae9b26da91de7c91d3502\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_alpha.deb\n    Size/MD5 checksum:  1687294 9862913548fff9bfda37a6fe075df5b0\n\namd64 architecture (AMD x86_64 (AMD64))\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_amd64.deb\n    Size/MD5 checksum:   809202 171520d7642019943bfe7166876f5da5\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_amd64.deb\n    Size/MD5 checksum:  1493308 9575f135e9ec312f9e6d7d2517dd8f5b\n\narm architecture (ARM)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_arm.deb\n    Size/MD5 checksum:   803714 6db06ffcba7f6d7576ed356e7989557d\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_arm.deb\n    Size/MD5 checksum:  1468616 9afde01dda379acd4e7edfbccc7c7b2d\n\nhppa architecture (HP PA RISC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_hppa.deb\n    Size/MD5 checksum:  1773794 c9012a9d3919ec40dcea1264ac27a6fe\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_hppa.deb\n    Size/MD5 checksum:   963060 565daaf6f15ff7593d560ef7a2f94364\n\ni386 architecture (Intel ia32)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_i386.deb\n    Size/MD5 checksum:   796992 5270bef04f1c2e924b813dffe6050d89\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_i386.deb\n    Size/MD5 checksum:  1458826 b2f3cbaac0ffcce0bb8d7e656bf11b02\n\nia64 architecture (Intel ia64)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_ia64.deb\n    Size/MD5 checksum:  1217142 afeaf9bfc66ebb69767703bfb30bbd4c\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_ia64.deb\n    Size/MD5 checksum:  2218472 6545e9b6f58a84c0daa76baa8a0db629\n\nmipsel architecture (MIPS (Little Endian))\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_mipsel.deb\n    Size/MD5 checksum:   946638 5323268be89e54c5c8eb7ae13f0eab14\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_mipsel.deb\n    Size/MD5 checksum:  1721268 0b710c0bcc6ffefe29f683ab09d3cbe8\n\npowerpc architecture (PowerPC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_powerpc.deb\n    Size/MD5 checksum:  1554798 eadd6236b778761086d436dd8db986e4\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_powerpc.deb\n    Size/MD5 checksum:   849204 d22f5d59f03d6484e149d7536a25a517\n\ns390 architecture (IBM S/390)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_s390.deb\n    Size/MD5 checksum:  1401814 0e3f588c64e8fa9a102ebcae29c4d807\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_s390.deb\n    Size/MD5 checksum:   767392 4b7c1a868f2f909c2dce25087da77817\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_sparc.deb\n    Size/MD5 checksum:  1394680 8b17e2339e2a908a610271eb678495b1\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_sparc.deb\n    Size/MD5 checksum:   763618 f3897333018702ee926e41ca5f58dc92\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.dsc\n    Size/MD5 checksum:     1266 faeebc4dfc74129ca708a6345bb483f7\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02.orig.tar.gz\n    Size/MD5 checksum:   674912 599dc4cc65a07ee868cf92a667a913d2\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.diff.gz\n    Size/MD5 checksum:    42280 362f72e95494f51a19eeb898b9a527ac\n\nArchitecture independent packages:\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.02-1.4+lenny1_all.deb\n    Size/MD5 checksum:    67664 b5f063bf32cbeaf1aaeec315dc8aff0a\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1_all.deb\n    Size/MD5 checksum:     1268 f67780458dac3c38cd59bfde186f9a3b\n\nalpha architecture (DEC Alpha)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_alpha.deb\n    Size/MD5 checksum:  1896344 f65f591413c25a23ea2aaccba2b5b634\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_alpha.deb\n    Size/MD5 checksum:  1018434 cb679c93bbc428ea852bd4ef3103e42d\n\namd64 architecture (AMD x86_64 (AMD64))\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_amd64.deb\n    Size/MD5 checksum:  1709514 1e1277251a6dd0bb0a551997efd39175\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_amd64.deb\n    Size/MD5 checksum:   921892 fb7de1db5e3885365c3ad74c3646ab57\n\narm architecture (ARM)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_arm.deb\n    Size/MD5 checksum:  1667088 58ddefe40598d6fe4a5016145163ef45\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_arm.deb\n    Size/MD5 checksum:   907908 881594298fe547cefa3d528c519d369f\n\narmel architecture (ARM EABI)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_armel.deb\n    Size/MD5 checksum:   886242 51d55f7c4de41c5d4051f41fde9b7389\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_armel.deb\n    Size/MD5 checksum:  1602392 bc996edfad6d1995cb4ef2f4c7760b51\n\nhppa architecture (HP PA RISC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_hppa.deb\n    Size/MD5 checksum:  1076286 fa3ac4a1001abf3e892bb1397b06ff17\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_hppa.deb\n    Size/MD5 checksum:  1985520 e95263d094e2c8d6aa72ee1edb9105f3\n\ni386 architecture (Intel ia32)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_i386.deb\n    Size/MD5 checksum:   876656 441042932886fa29adae731338f6b5bd\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_i386.deb\n    Size/MD5 checksum:  1611730 52516381da25dbb0c1145e2b7cdf692a\n\nia64 architecture (Intel ia64)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_ia64.deb\n    Size/MD5 checksum:  1380222 0ffaee560534c9d69df433340679c8fc\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_ia64.deb\n    Size/MD5 checksum:  2519970 eb4f4e5c173557fa8ae713f123cbb193\n\nmips architecture (MIPS (Big Endian))\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mips.deb\n    Size/MD5 checksum:  1894924 58b336b114ef5c8fb9fc6244411b4cf4\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mips.deb\n    Size/MD5 checksum:  1040834 ae8ed06ea2ed07e3a064c6bd28e80933\n\nmipsel architecture (MIPS (Little Endian))\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mipsel.deb\n    Size/MD5 checksum:  1026954 eac8167230b8fa208cdbc5b196f0c624\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mipsel.deb\n    Size/MD5 checksum:  1872050 8f2e99ce5a102d099ba22543f246d5bd\n\npowerpc architecture (PowerPC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_powerpc.deb\n    Size/MD5 checksum:  1788584 7d1466cc8770bd92f299c1cc772f64e7\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_powerpc.deb\n    Size/MD5 checksum:   968838 7cc8568d6b74348300066e42b27f90c2\n\ns390 architecture (IBM S/390)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_s390.deb\n    Size/MD5 checksum:   871666 1dde93a4cc0a28b90f92c05f0d181079\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_s390.deb\n    Size/MD5 checksum:  1598270 201ad07e4853843dce22f22daa41fd35\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_sparc.deb\n    Size/MD5 checksum:   863662 446f2d8fe6483d3741648c4db1ff5b82\n  http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_sparc.deb\n    Size/MD5 checksum:  1586262 52861c00f406c35db8a6e6f3269cc37d\n\n\n  These files will probably be moved into the stable distribution on\n  its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFKAJvfYrVLjBFATsMRAvL3AJ48hk1Vsp4ZvDGoQfwOunErKHxElQCfepN+\nrFYyqIcPRzz8zBGVGObkTr8=\n=xhzW\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      },
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      },
      {
        "db": "PACKETSTORM",
        "id": "77279"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.kb.cert.org/vuls/id/196617",
        "trust": 0.8,
        "type": "poc"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-37592",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "34568",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "34291",
        "trust": 1.9
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146",
        "trust": 1.5
      },
      {
        "db": "SECUNIA",
        "id": "34481",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35618",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34756",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35074",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35065",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35685",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34963",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35037",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "35064",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34852",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34959",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34991",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "34755",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1621",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1066",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1297",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1040",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1077",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1065",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1022073",
        "trust": 1.1
      },
      {
        "db": "USCERT",
        "id": "TA09-133A",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1022072",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#196617",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "82087",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "77104",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "77279",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "82086",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "83554",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76918",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "89072",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "92846",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76751",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82088",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "77313",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "77000",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "123523",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83707",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "84482",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "89656",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      },
      {
        "db": "PACKETSTORM",
        "id": "77279"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "id": "VAR-200904-0808",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T19:44:18.364000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://www.debian.org/security/2009/dsa-1790"
      },
      {
        "trust": 1.9,
        "url": "http://support.apple.com/kb/ht3549"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/34568"
      },
      {
        "trust": 1.1,
        "url": "http://lists.apple.com/archives/security-announce/2009/may/msg00002.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/502761/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/502750/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta09-133a.html"
      },
      {
        "trust": 1.1,
        "url": "http://bugs.gentoo.org/show_bug.cgi?id=263028"
      },
      {
        "trust": 1.1,
        "url": "http://support.apple.com/kb/ht3639"
      },
      {
        "trust": 1.1,
        "url": "http://wiki.rpath.com/advisories:rpsa-2009-0059"
      },
      {
        "trust": 1.1,
        "url": "http://wiki.rpath.com/advisories:rpsa-2009-0061"
      },
      {
        "trust": 1.1,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2009/dsa-1793"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-july/msg00567.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01277.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01291.html"
      },
      {
        "trust": 1.1,
        "url": "http://security.gentoo.org/glsa/glsa-200904-20.xml"
      },
      {
        "trust": 1.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:101"
      },
      {
        "trust": 1.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:087"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9632"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-0429.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-0430.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-0431.html"
      },
      {
        "trust": 1.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2009-0458.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-0480.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1022073"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34291"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34481"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34755"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34756"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34852"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34959"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34963"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/34991"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35037"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35064"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35065"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35074"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35618"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/35685"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/1065"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/1066"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/1077"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/1297"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/1621"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1040"
      },
      {
        "trust": 1.0,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.578477"
      },
      {
        "trust": 0.8,
        "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=9f1312f3d7dfa7e536606a7c7296b7c876b11c00"
      },
      {
        "trust": 0.8,
        "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl3.patch"
      },
      {
        "trust": 0.8,
        "url": "http://www.ubuntu.com/usn/usn-759-1"
      },
      {
        "trust": 0.8,
        "url": "http://blackberry.com/btsc/kb17953"
      },
      {
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2009-0429.html"
      },
      {
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2009-0431.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.mandriva.com/en/security/advisories?name=mdvsa-2009:101"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/34291/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2009/apr/1022072.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu196617/index.html"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0166"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0165"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0147"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0146"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0147"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0166"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0146"
      },
      {
        "trust": 0.3,
        "url": "http://www.mandriva.com/security/"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0165"
      },
      {
        "trust": 0.3,
        "url": "http://www.mandriva.com/security/advisories"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1180"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1179"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1182"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0799"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0800"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1181"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1183"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0163"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0791"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3609"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3609"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0791"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0163"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3608"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0949"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0949"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3608"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1181"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0800"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0799"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1180"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1183"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1182"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1179"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2009\u0026amp;m=slackware-security.578477"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0195"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0195"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_armel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.02-1.4+lenny1_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_armel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.02-1.4+lenny1.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-common_3.01-9.1+etch6_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.02-1.4+lenny1_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://packages.debian.org/\u003cpkg\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-reader_3.01-9.1+etch6_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.01-9.1+etch6_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf_3.01-9.1+etch6.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/x/xpdf/xpdf-utils_3.02-1.4+lenny1_powerpc.deb"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      },
      {
        "db": "PACKETSTORM",
        "id": "77279"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      },
      {
        "db": "PACKETSTORM",
        "id": "77279"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-04-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "date": "2009-04-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "date": "2009-10-21T02:32:05",
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "date": "2009-04-29T19:11:04",
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "date": "2009-10-21T02:57:54",
        "db": "PACKETSTORM",
        "id": "82087"
      },
      {
        "date": "2009-05-05T22:51:02",
        "db": "PACKETSTORM",
        "id": "77279"
      },
      {
        "date": "2009-04-23T17:30:01.547000",
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-03-28T00:00:00",
        "db": "CERT/CC",
        "id": "VU#196617"
      },
      {
        "date": "2019-03-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-37592"
      },
      {
        "date": "2024-11-21T00:59:10.130000",
        "db": "NVD",
        "id": "CVE-2009-0146"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Xpdf and poppler contain multiple vulnerabilities in the processing of JBIG2 data",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#196617"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "overflow",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "82086"
      },
      {
        "db": "PACKETSTORM",
        "id": "77104"
      },
      {
        "db": "PACKETSTORM",
        "id": "82087"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.