var-200905-0178
Vulnerability from variot

Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information. MuPDF is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: MuPDF "loadexponentialfunc()" Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA34916

VERIFY ADVISORY: http://secunia.com/advisories/34916/

DESCRIPTION: c has discovered a vulnerability in MuPDF, which can be exploited by malicious people to potentially compromise an application using the library.

The vulnerability is caused due to a boundary error within the "loadexponentialfunc()" function in pdf_function.c.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in the MuPDF library included in the mupdf-20090223-win32 package. Other versions may also be affected.

SOLUTION: Do not process untrusted PDF files using the library.

PROVIDED AND/OR DISCOVERED BY: c

ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0178",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.5"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.6"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.2"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.7"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.8.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.4"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.2"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.8"
      },
      {
        "model": "sumatrapdf",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.8.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.4"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.7"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.8"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.5"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.6"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.2"
      },
      {
        "model": "pdf sumatra pdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sumatra",
        "version": "0.9.3"
      },
      {
        "model": "mupdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mupdf",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:krzysztof_kowalczyk:sumatrapdf",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "c c@c.cc)",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-1605",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-1605",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2009-1605",
            "impactScore": 2.5,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1605",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2009-1605",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1605",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-123",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2009-1605",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: some of these details are obtained from third party information. MuPDF is prone to a remote code-execution vulnerability. \nAn attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nMuPDF \"loadexponentialfunc()\" Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA34916\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34916/\n\nDESCRIPTION:\nc has discovered a vulnerability in MuPDF, which can be exploited by\nmalicious people to potentially compromise an application using the\nlibrary. \n\nThe vulnerability is caused due to a boundary error within the\n\"loadexponentialfunc()\" function in pdf_function.c. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is confirmed in the MuPDF library included in the\nmupdf-20090223-win32 package. Other versions may also be affected. \n\nSOLUTION:\nDo not process untrusted PDF files using the library. \n\nPROVIDED AND/OR DISCOVERED BY:\nc\n\nORIGINAL ADVISORY:\nhttp://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1605",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "34916",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1186",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1185",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "34746",
        "trust": 0.4
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1605",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "77098",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "id": "VAR-200905-0178",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.16666667
  },
  "last_update_date": "2024-11-23T21:47:55.424000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://mupdf.com/"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/0xCyberY/CVE-T4PDF "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1186"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34916"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1185"
      },
      {
        "trust": 1.0,
        "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd"
      },
      {
        "trust": 1.0,
        "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1605"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1605"
      },
      {
        "trust": 0.3,
        "url": "http://ccxvii.net/fitz/"
      },
      {
        "trust": 0.3,
        "url": "http://blog.kowalczyk.info/software/sumatrapdf/index.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/34746"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0xcybery/cve-t4pdf"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34916/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-05-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "date": "2009-04-24T00:00:00",
        "db": "BID",
        "id": "34746"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "date": "2009-04-29T10:20:18",
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "date": "2009-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "date": "2009-05-11T20:00:00.250000",
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "date": "2009-05-21T05:20:00",
        "db": "BID",
        "id": "34746"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "date": "2021-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "date": "2024-11-21T01:02:53.313000",
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SumatraPDF Heap-based buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…