Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-3604

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-21 Oct, 2009 | 17:00
Updated At-07 Aug, 2024 | 06:31
Rejected At-
Credits

The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:21 Oct, 2009 | 17:00
Updated At:07 Aug, 2024 | 06:31
Rejected At:
â–¼CVE Numbering Authority (CNA)

The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/39938
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/37042
third-party-advisory
x_refsource_SECUNIA
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/37028
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
vendor-advisory
x_refsource_FEDORA
http://site.pi3.com.pl/adv/xpdf.txt
x_refsource_MISC
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
vendor-advisory
x_refsource_FEDORA
https://rhn.redhat.com/errata/RHSA-2009-1501.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/37079
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
vendor-advisory
x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
vdb-entry
x_refsource_XF
http://www.debian.org/security/2010/dsa-2028
vendor-advisory
x_refsource_DEBIAN
http://www.debian.org/security/2010/dsa-2050
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/37159
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
vendor-advisory
x_refsource_FEDORA
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
vendor-advisory
x_refsource_SUNALERT
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
vendor-advisory
x_refsource_FEDORA
https://rhn.redhat.com/errata/RHSA-2009-1512.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/37114
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/37077
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1023029
vdb-entry
x_refsource_SECTRACK
https://rhn.redhat.com/errata/RHSA-2009-1503.html
vendor-advisory
x_refsource_REDHAT
http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
vendor-advisory
x_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/37037
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1040
vdb-entry
x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-850-3
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0802
vdb-entry
x_refsource_VUPEN
https://rhn.redhat.com/errata/RHSA-2009-1502.html
vendor-advisory
x_refsource_REDHAT
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
vendor-advisory
x_refsource_FEDORA
http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
x_refsource_CONFIRM
https://rhn.redhat.com/errata/RHSA-2009-1500.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2009/2928
vdb-entry
x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=526911
x_refsource_CONFIRM
http://secunia.com/advisories/37023
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2924
vdb-entry
x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
vendor-advisory
x_refsource_MANDRIVA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
vendor-advisory
x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2010/1220
vdb-entry
x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-850-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/37053
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/39327
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/37043
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/36703
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/39938
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/37042
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/37028
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://site.pi3.com.pl/adv/xpdf.txt
Resource:
x_refsource_MISC
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1501.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/37079
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.debian.org/security/2010/dsa-2028
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.debian.org/security/2010/dsa-2050
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/37159
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1512.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/37114
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/37077
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1023029
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1503.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/37037
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2010/1040
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ubuntu.com/usn/USN-850-3
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2010/0802
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1502.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
Resource:
x_refsource_CONFIRM
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1500.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2009/2928
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=526911
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/37023
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/2924
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.vupen.com/english/advisories/2010/1220
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ubuntu.com/usn/USN-850-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/37053
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/39327
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/37043
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/36703
Resource:
vdb-entry
x_refsource_BID
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/39938
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/37042
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/37028
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://site.pi3.com.pl/adv/xpdf.txt
x_refsource_MISC
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://rhn.redhat.com/errata/RHSA-2009-1501.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/37079
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
vdb-entry
x_refsource_XF
x_transferred
http://www.debian.org/security/2010/dsa-2028
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.debian.org/security/2010/dsa-2050
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/37159
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://rhn.redhat.com/errata/RHSA-2009-1512.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/37114
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/37077
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1023029
vdb-entry
x_refsource_SECTRACK
x_transferred
https://rhn.redhat.com/errata/RHSA-2009-1503.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/37037
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2010/1040
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ubuntu.com/usn/USN-850-3
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2010/0802
vdb-entry
x_refsource_VUPEN
x_transferred
https://rhn.redhat.com/errata/RHSA-2009-1502.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
x_refsource_CONFIRM
x_transferred
https://rhn.redhat.com/errata/RHSA-2009-1500.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2009/2928
vdb-entry
x_refsource_VUPEN
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=526911
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/37023
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/2924
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.vupen.com/english/advisories/2010/1220
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ubuntu.com/usn/USN-850-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/37053
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/39327
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/37043
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/36703
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/39938
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/37042
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/37028
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://site.pi3.com.pl/adv/xpdf.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1501.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/37079
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.debian.org/security/2010/dsa-2028
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.debian.org/security/2010/dsa-2050
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/37159
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1512.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/37114
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/37077
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1023029
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1503.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/37037
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1040
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-850-3
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/0802
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1502.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1500.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/2928
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=526911
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/37023
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/2924
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1220
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-850-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/37053
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/39327
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/37043
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/36703
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:21 Oct, 2009 | 17:30
Updated At:13 Feb, 2023 | 01:17

The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

The GNOME Project
gnome
>>gpdf>>*
cpe:2.3:a:gnome:gpdf:*:*:*:*:*:*:*:*
KDE
kde
>>kpdf>>*
cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
foolabs
foolabs
>>xpdf>>3.02pl1
cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
foolabs
foolabs
>>xpdf>>3.02pl2
cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
foolabs
foolabs
>>xpdf>>3.02pl3
cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>2.00
cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>2.01
cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>2.02
cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>2.03
cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>3.00
cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>3.01
cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
glyphandcog
glyphandcog
>>xpdfreader>>3.02
cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.1
cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.1.1
cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.1.2
cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.2.0
cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.3.0
cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.3.1
cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.3.2
cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.3.3
cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.4.0
cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.4.1
cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.4.2
cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.4.3
cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.4.4
cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.0
cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.1
cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.2
cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.3
cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.4
cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.9
cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.90
cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.5.91
cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.6.0
cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.6.1
cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.6.2
cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.6.3
cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.6.4
cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.7.0
cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.7.1
cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.7.2
cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.7.3
cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.0
cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.1
cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.2
cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.3
cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.4
cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.5
cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.6
cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*
poppler
poppler
>>poppler>>0.8.7
cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patchsecalert@redhat.com
Patch
http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2secalert@redhat.com
N/A
http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/37023secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37028secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37037secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37042secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37043secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37053secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37077secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37079secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37114secalert@redhat.com
N/A
http://secunia.com/advisories/37159secalert@redhat.com
N/A
http://secunia.com/advisories/39327secalert@redhat.com
N/A
http://secunia.com/advisories/39938secalert@redhat.com
N/A
http://securitytracker.com/id?1023029secalert@redhat.com
N/A
http://site.pi3.com.pl/adv/xpdf.txtsecalert@redhat.com
Exploit
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1secalert@redhat.com
N/A
http://www.debian.org/security/2010/dsa-2028secalert@redhat.com
N/A
http://www.debian.org/security/2010/dsa-2050secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175secalert@redhat.com
N/A
http://www.securityfocus.com/bid/36703secalert@redhat.com
Exploit
Patch
http://www.ubuntu.com/usn/USN-850-1secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-850-3secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2009/2924secalert@redhat.com
Patch
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928secalert@redhat.com
Patch
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0802secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/1040secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/1220secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=526911secalert@redhat.com
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/53795secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969secalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2009-1500.htmlsecalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2009-1501.htmlsecalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2009-1502.htmlsecalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2009-1503.htmlsecalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2009-1512.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.htmlsecalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.htmlsecalert@redhat.com
N/A
Hyperlink: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://cgit.freedesktop.org/poppler/poppler/diff/?id=284a928996&id2=75c3466ba2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/37023
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37028
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37037
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37042
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37043
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37053
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37077
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37079
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37114
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/37159
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/39327
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/39938
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1023029
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://site.pi3.com.pl/adv/xpdf.txt
Source: secalert@redhat.com
Resource:
Exploit
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2010/dsa-2028
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2010/dsa-2050
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/36703
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.ubuntu.com/usn/USN-850-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-850-3
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/2924
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/2928
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/0802
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/1040
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/1220
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=526911
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10969
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1500.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1501.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1502.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1503.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2009-1512.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

152Records found

CVE-2008-1670
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-4.19% / 88.47%
||
7 Day CHG~0.00%
Published-28 Apr, 2008 | 17:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.

Action-Not Available
Vendor-n/aKDE
Product-kden/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-1109
Matching Score-8
Assigner-Flexera Software LLC
ShareView Details
Matching Score-8
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-4.24% / 88.52%
||
7 Day CHG~0.00%
Published-04 Jun, 2008 | 20:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).

Action-Not Available
Vendor-n/aThe GNOME Project
Product-evolutionn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-0668
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-6.66% / 91.01%
||
7 Day CHG~0.00%
Published-11 Feb, 2008 | 20:00
Updated-07 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aThe GNOME ProjectRed Hat, Inc.
Product-fedoragnumericn/a
CWE ID-CWE-189
Not Available
CVE-2009-4035
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-2.45% / 84.88%
||
7 Day CHG~0.00%
Published-21 Dec, 2009 | 21:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.

Action-Not Available
Vendor-xpdfn/aThe GNOME ProjectKDE
Product-gpdfkpdfxpdfkdegraphicsn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-3607
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-6.86% / 91.16%
||
7 Day CHG~0.00%
Published-21 Oct, 2009 | 17:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-popplern/a
Product-popplern/a
CWE ID-CWE-189
Not Available
CVE-2004-1125
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.31% / 91.48%
||
7 Day CHG~0.00%
Published-22 Dec, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.

Action-Not Available
Vendor-xpdfeasy_software_productsn/aKDE
Product-cupsxpdfkden/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-3193
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-4.64% / 89.03%
||
7 Day CHG~0.00%
Published-16 Jun, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

Action-Not Available
Vendor-qtn/aCanonical Ltd.The GNOME ProjectRed Hat, Inc.openSUSE
Product-qtenterprise_linux_desktopubuntu_linuxenterprise_linux_eusenterprise_linux_workstationpangoopensuseenterprise_linux_servern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2007-0999
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-1.94% / 83.11%
||
7 Day CHG~0.00%
Published-10 Mar, 2007 | 19:00
Updated-07 Aug, 2024 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in Ekiga 2.0.3, and probably other versions, allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2007-1006.

Action-Not Available
Vendor-n/aThe GNOME Project
Product-ekigan/a
CVE-2019-7443
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.66% / 81.74%
||
7 Day CHG~0.00%
Published-07 May, 2019 | 18:41
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

Action-Not Available
Vendor-n/aKDESUSEopenSUSEFedora Project
Product-linux_enterprisefedorakauthbackportsleapn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2010-4654
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.47% / 63.94%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 19:41
Updated-07 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

poppler before 0.16.3 has malformed commands that may cause corruption of the internal stack.

Action-Not Available
Vendor-popplerDebian GNU/Linuxfreedesktop.org
Product-debian_linuxpopplerpoppler
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2009-3603
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-6.28% / 90.71%
||
7 Day CHG~0.00%
Published-21 Oct, 2009 | 17:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/a
Product-xpdfxpdfreaderpopplern/a
CWE ID-CWE-189
Not Available
CVE-2009-3606
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-4.77% / 89.21%
||
7 Day CHG~0.00%
Published-21 Oct, 2009 | 17:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/aKDE
Product-kpdfxpdfxpdfreaderpopplern/a
CWE ID-CWE-189
Not Available
CVE-2009-3608
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-12.66% / 93.81%
||
7 Day CHG~0.00%
Published-21 Oct, 2009 | 17:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

Action-Not Available
Vendor-foolabspopplerglyphandcogtetexglyph_and_cogn/aThe GNOME ProjectKDE
Product-gpdfxpdfreaderkpdfxpdfpdftopstetexpopplern/a
CWE ID-CWE-189
Not Available
CVE-2009-2896
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-20.93% / 95.49%
||
7 Day CHG~0.00%
Published-20 Aug, 2009 | 17:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in KMplayer 2.9.4.1433 and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long string in a subtitle (.srt) playlist file. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aKDE
Product-kmplayern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2404
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-21.02% / 95.50%
||
7 Day CHG~0.00%
Published-03 Aug, 2009 | 14:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

Action-Not Available
Vendor-n/aPidginThe GNOME ProjectAOL (Yahoo Inc.)Mozilla Corporation
Product-thunderbirdfirefoxnetwork_security_servicesseamonkeypidgininstant_messengerevolutionn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-4833
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.30% / 53.19%
||
7 Day CHG~0.00%
Published-06 Sep, 2011 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ before 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.

Action-Not Available
Vendor-n/aThe GNOME Project
Product-gtkn/a
CWE ID-CWE-426
Untrusted Search Path
CVE-2009-0166
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-5.19% / 89.67%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 17:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/aApple Inc.
Product-xpdfcupsxpdfreaderpopplern/a
CWE ID-CWE-399
Not Available
CVE-2008-5698
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-7.75% / 91.75%
||
7 Day CHG+0.68%
Published-22 Dec, 2008 | 15:00
Updated-07 Aug, 2024 | 11:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aKDE
Product-kdekonquerorn/a
CWE ID-CWE-399
Not Available
CVE-2008-4382
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.47% / 64.19%
||
7 Day CHG~0.00%
Published-02 Oct, 2008 | 18:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters.

Action-Not Available
Vendor-n/aKDE
Product-konquerorn/a
CWE ID-CWE-399
Not Available
CVE-2007-4941
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-6.94% / 91.22%
||
7 Day CHG~0.00%
Published-18 Sep, 2007 | 19:00
Updated-07 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KMPlayer 2.9.3.1210 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a .avi file with certain large "indx truck size" and nEntriesInuse values.

Action-Not Available
Vendor-n/aKDE
Product-kmplayern/a
CWE ID-CWE-399
Not Available
CVE-2007-1308
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-14.58% / 94.30%
||
7 Day CHG+0.33%
Published-07 Mar, 2007 | 00:00
Updated-07 Aug, 2024 | 12:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.

Action-Not Available
Vendor-n/aKDE
Product-konquerorn/a
CWE ID-CWE-399
Not Available
CVE-2006-6297
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.61% / 85.32%
||
7 Day CHG~0.00%
Published-05 Dec, 2006 | 11:00
Updated-07 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.

Action-Not Available
Vendor-n/aKDE
Product-kdegraphicsn/a
CWE ID-CWE-399
Not Available
CVE-2007-6000
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.23% / 88.51%
||
7 Day CHG~0.00%
Published-15 Nov, 2007 | 22:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters.

Action-Not Available
Vendor-n/aKDE
Product-konquerorn/a
CWE ID-CWE-399
Not Available
CVE-2009-2537
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-3.61% / 87.51%
||
7 Day CHG~0.00%
Published-20 Jul, 2009 | 18:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.

Action-Not Available
Vendor-n/aKDE
Product-konquerorn/a
CWE ID-CWE-399
Not Available
CVE-2009-1181
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-2.43% / 84.83%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/aApple Inc.
Product-xpdfcupsxpdfreaderpopplern/a
CWE ID-CWE-399
Not Available
CVE-2009-1183
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-1.70% / 81.95%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/aApple Inc.
Product-xpdfcupsxpdfreaderpopplern/a
CWE ID-CWE-399
Not Available
CVE-2009-1180
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-8.83% / 92.34%
||
7 Day CHG~0.00%
Published-23 Apr, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.

Action-Not Available
Vendor-glyphandcogpopplerfoolabsn/aApple Inc.
Product-xpdfcupsxpdfreaderpopplern/a
CWE ID-CWE-399
Not Available
CVE-2009-0140
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.43% / 61.76%
||
7 Day CHG~0.00%
Published-13 Feb, 2009 | 00:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SMB component in Apple Mac OS X 10.4.11 and 10.5.6 allows remote SMB servers to cause a denial of service (memory exhaustion and system shutdown) via a crafted file system name.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2009-0219
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.31% / 88.63%
||
7 Day CHG~0.00%
Published-21 Jan, 2009 | 01:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The PDF distiller in the Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) 4.1.3 through 4.1.6, BlackBerry Professional Software 4.1.4, and BlackBerry Unite! before 1.0.3 bundle 28 performs delete operations on uninitialized pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted data stream in a .pdf file.

Action-Not Available
Vendor-research_in_motion_limitedn/a
Product-blackberry_uniteblackberry_enterprise_serverblackberry_professional_softwaren/a
CWE ID-CWE-399
Not Available
CVE-2009-0095
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-48.81% / 97.68%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly validate object data in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Validation Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-vision/a
CWE ID-CWE-399
Not Available
CVE-2009-0097
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-57.43% / 98.09%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Office Visio 2002 SP2 and 2003 SP3 does not properly validate memory allocation for Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-vision/a
CWE ID-CWE-399
Not Available
CVE-2008-7053
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-18.75% / 95.12%
||
7 Day CHG~0.00%
Published-24 Aug, 2009 | 19:00
Updated-07 Aug, 2024 | 11:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LogMeIn Remote Access Utility ActiveX control (RACtrl.dll) allows remote attackers to cause a denial of service (crash) by setting the fgcolor and bgcolor properties to certain long values that trigger memory corruption.

Action-Not Available
Vendor-logmeinn/a
Product-ractrl.dlln/a
CWE ID-CWE-399
Not Available
CVE-2009-0259
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-15.50% / 94.49%
||
7 Day CHG~0.00%
Published-22 Jan, 2009 | 23:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Word processor in OpenOffice.org 1.1.2 through 1.1.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008, as demonstrated by 2008-crash.doc.rar, and a similar issue to CVE-2008-4841.

Action-Not Available
Vendor-openofficen/a
Product-openoffice.orgn/a
CWE ID-CWE-399
Not Available
CVE-2009-0102
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-47.22% / 97.60%
||
7 Day CHG~0.00%
Published-09 Dec, 2009 | 18:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Project 2000 SR1 and 2002 SP1, and Office Project 2003 SP3, does not properly handle memory allocation for Project files, which allows remote attackers to execute arbitrary code via a malformed file, aka "Project Memory Validation Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_projectproject_portfolio_serverproject_servern/a
CWE ID-CWE-399
Not Available
CVE-2009-0098
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-62.51% / 98.32%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-exchange_servern/a
CWE ID-CWE-399
Not Available
CVE-2009-0188
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-9.03% / 92.45%
||
7 Day CHG~0.00%
Published-02 Jun, 2009 | 18:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie composed of a Sorenson 3 video file.

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CWE ID-CWE-399
Not Available
CVE-2009-0076
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-58.48% / 98.15%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Explorer 7, when XHTML strict mode is used, allows remote attackers to execute arbitrary code via the zoom style directive in conjunction with unspecified other directives in a malformed Cascading Style Sheets (CSS) stylesheet in a crafted HTML document, aka "CSS Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorerwindows_vistawindows_xpwindows_server_2003windows_server_2008n/a
CWE ID-CWE-399
Not Available
CVE-2009-0005
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.38% / 88.72%
||
7 Day CHG~0.00%
Published-21 Jan, 2009 | 20:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted H.263 encoded movie file that triggers memory corruption.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-quicktimewindows_xpwindows_vistamac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2009-0096
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-63.27% / 98.35%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly perform memory copy operations for object data, which allows remote attackers to execute arbitrary code via a crafted Visio document, aka "Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-vision/a
CWE ID-CWE-399
Not Available
CVE-2009-0075
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-86.93% / 99.41%
||
7 Day CHG~0.00%
Published-10 Feb, 2009 | 22:13
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorerwindows_vistawindows_xpwindows_server_2003windows_server_2008n/a
CWE ID-CWE-399
Not Available
CVE-2008-5679
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.20% / 78.57%
||
7 Day CHG~0.00%
Published-19 Dec, 2008 | 16:09
Updated-07 Aug, 2024 | 11:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.

Action-Not Available
Vendor-n/aOpera
Product-operan/a
CWE ID-CWE-399
Not Available
CVE-2008-4844
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-82.85% / 99.22%
||
7 Day CHG~0.00%
Published-11 Dec, 2008 | 15:00
Updated-07 Aug, 2024 | 10:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorern/a
CWE ID-CWE-399
Not Available
CVE-2008-4813
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-26.41% / 96.19%
||
7 Day CHG+5.17%
Published-05 Nov, 2008 | 14:51
Updated-07 Aug, 2024 | 10:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-acrobat_readeracrobatn/a
CWE ID-CWE-399
Not Available
CVE-2008-2325
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.83% / 89.27%
||
7 Day CHG~0.00%
Published-04 Aug, 2008 | 01:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."

Action-Not Available
Vendor-n/aApple Inc.
Product-quicklookmac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2008-5013
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-23.92% / 95.89%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxseamonkeyn/a
CWE ID-CWE-399
Not Available
CVE-2008-4027
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-65.86% / 98.46%
||
7 Day CHG~0.00%
Published-10 Dec, 2008 | 13:33
Updated-07 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted (1) RTF file or (2) rich text e-mail message with multiple consecutive Drawing Object ("\do") tags, which triggers a "memory calculation error" and memory corruption, aka "Word RTF Object Parsing Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_word_vieweroffice_wordopen_xml_file_format_converterofficeoffice_outlookworksoffice_systemoffice_compatibility_pack_for_word_excel_ppt_2007n/a
CWE ID-CWE-399
Not Available
CVE-2008-4031
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-59.89% / 98.21%
||
7 Day CHG~0.00%
Published-10 Dec, 2008 | 13:33
Updated-07 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a malformed string in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and memory corruption, aka "Word RTF Object Parsing Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_word_vieweroffice_wordopen_xml_file_format_converterofficeoffice_outlookworksoffice_systemoffice_compatibility_pack_for_word_excel_ppt_2007n/a
CWE ID-CWE-399
Not Available
CVE-2008-3621
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-3.67% / 87.63%
||
7 Day CHG~0.00%
Published-16 Sep, 2008 | 23:00
Updated-07 Aug, 2024 | 09:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via vectors involving H.264 encoded media.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2008-2435
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-33.77% / 96.84%
||
7 Day CHG~0.00%
Published-23 Dec, 2008 | 18:13
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to execute arbitrary code via a crafted notifyOnLoadNative callback function.

Action-Not Available
Vendor-n/aTrend Micro Incorporated
Product-housecalln/a
CWE ID-CWE-399
Not Available
CVE-2008-4231
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.66% / 91.70%
||
7 Day CHG~0.00%
Published-25 Nov, 2008 | 23:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Safari in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 does not properly handle HTML TABLE elements, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_ossafariipod_touchn/a
CWE ID-CWE-399
Not Available
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found