Description
Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
Published: 2009-04-23
Score: 4.3 Medium
EPSS: 2.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1790-1 New xpdf packages fix multiple vulnerabilities
Debian DSA Debian DSA DSA-1793-1 New kdegraphics packages fix multiple vulnerabilities
EUVD EUVD EUVD-2009-0156 Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
Ubuntu USN Ubuntu USN USN-759-1 poppler vulnerabilities
Ubuntu USN Ubuntu USN USN-973-1 KOffice vulnerabilities
References
Link Providers
http://bugs.gentoo.org/show_bug.cgi?id=263028 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2009-0458.html cve-icon cve-icon
http://secunia.com/advisories/34291 cve-icon cve-icon
http://secunia.com/advisories/34481 cve-icon cve-icon
http://secunia.com/advisories/34755 cve-icon cve-icon
http://secunia.com/advisories/34756 cve-icon cve-icon
http://secunia.com/advisories/34852 cve-icon cve-icon
http://secunia.com/advisories/34959 cve-icon cve-icon
http://secunia.com/advisories/34963 cve-icon cve-icon
http://secunia.com/advisories/34991 cve-icon cve-icon
http://secunia.com/advisories/35037 cve-icon cve-icon
http://secunia.com/advisories/35064 cve-icon cve-icon
http://secunia.com/advisories/35065 cve-icon cve-icon
http://secunia.com/advisories/35074 cve-icon cve-icon
http://secunia.com/advisories/35618 cve-icon cve-icon
http://secunia.com/advisories/35685 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200904-20.xml cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477 cve-icon cve-icon
http://support.apple.com/kb/HT3549 cve-icon cve-icon
http://support.apple.com/kb/HT3639 cve-icon cve-icon
http://wiki.rpath.com/Advisories:rPSA-2009-0059 cve-icon cve-icon
http://wiki.rpath.com/Advisories:rPSA-2009-0061 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1790 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1793 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:101 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-0429.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-0430.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-0431.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-0480.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/502750/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/502761/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/34568 cve-icon cve-icon
http://www.securitytracker.com/id?1022073 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA09-133A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1065 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1066 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1077 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1297 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1621 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1040 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=490614 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-0147 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-0147 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html cve-icon cve-icon
History

No history.

Subscriptions

Apple Cups
Foolabs Xpdf
Glyphandcog Xpdfreader
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T04:24:18.354Z

Reserved: 2009-01-16T00:00:00.000Z

Link: CVE-2009-0147

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-04-23T17:30:01.563

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-0147

cve-icon Redhat

Severity : Important

Publid Date: 2009-04-16T00:00:00Z

Links: CVE-2009-0147 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses