Vulnerability Name:

CVE-2009-0165 (CCN-50377)

Assigned:2009-04-16
Published:2009-04-16
Updated:2019-03-06
Summary:Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-189
Vulnerability Consequences:Other
References:Source: CCN
Type: Gentoo Bugzilla Bug 263028
< app-text/poppler-0.10.5-r1 JBIG2 Multiple vulnerabilities (CVE-2009-{0146,0147,0165,0166,0195,0799,0800,1179,1180,1181,1182,1183,1187,1188})

Source: CONFIRM
Type: Patch
http://bugs.gentoo.org/show_bug.cgi?id=263028

Source: MITRE
Type: CNA
CVE-2009-0165

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-06-17-1

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-05-12

Source: SUSE
Type: UNKNOWN
SUSE-SA:2009:024

Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:010

Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:012

Source: SECUNIA
Type: UNKNOWN
34852

Source: SECUNIA
Type: UNKNOWN
34959

Source: SECUNIA
Type: UNKNOWN
34991

Source: SECUNIA
Type: UNKNOWN
35037

Source: SECUNIA
Type: UNKNOWN
35065

Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
35074

Source: SECUNIA
Type: UNKNOWN
35685

Source: SLACKWARE
Type: UNKNOWN
SSA:2009-129-01

Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-002 / Mac OS X v10.5.7

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3549

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3639

Source: DEBIAN
Type: UNKNOWN
DSA-1790

Source: DEBIAN
Type: UNKNOWN
DSA-1793

Source: DEBIAN
Type: DSA-1790
xpdf -- multiple vulnerabilities

Source: DEBIAN
Type: DSA-1793
kdegraphics -- multiple vulnerabilities

Source: CCN
Type: Xpdf Web page
Xpdf

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:101

Source: CCN
Type: OSVDB ID: 54497
Xpdf on Apple Mac OS X JBIG2 Decoder Unspecified Overflow

Source: BID
Type: UNKNOWN
34568

Source: CCN
Type: BID-34568
Xpdf JBIG2 Processing Multiple Security Vulnerabilities

Source: CERT
Type: US Government Resource
TA09-133A

Source: VUPEN
Type: UNKNOWN
ADV-2009-1297

Source: VUPEN
Type: UNKNOWN
ADV-2009-1621

Source: XF
Type: UNKNOWN
multiple-jbig2-unspecified(50377)

Source: XF
Type: UNKNOWN
multiple-jbig2-unspecified(50377)

Source: SUSE
Type: SUSE-SA:2009:024
cups security problems

Source: SUSE
Type: SUSE-SR:2009:010
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2009:012
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:* (Version <= 3.02)
  • AND
  • cpe:/a:poppler:poppler:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.5:a:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00:a:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93:b:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20090165
    V
    CVE-2009-0165
    2022-05-20
    oval:org.opensuse.security:def:32207
    P
    Security update for util-linux (Moderate)
    2021-10-19
    oval:org.opensuse.security:def:29435
    P
    Security update for MozillaFirefox (Important)
    2021-10-15
    oval:org.opensuse.security:def:32073
    P
    Security update for sudo (Important)
    2021-04-20
    oval:org.opensuse.security:def:29399
    P
    Security update for MozillaFirefox (Important)
    2021-01-29
    oval:org.opensuse.security:def:31988
    P
    Security update for java-1_7_1-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:32705
    P
    libarchive2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28408
    P
    Security update for subversion (Important)
    2020-12-01
    oval:org.opensuse.security:def:27977
    P
    Security update for LibVNCServer (Critical)
    2020-12-01
    oval:org.opensuse.security:def:32766
    P
    pcsc-ccid on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28613
    P
    Security update for xorg-x11-server
    2020-12-01
    oval:org.opensuse.security:def:32300
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27989
    P
    Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)
    2020-12-01
    oval:org.opensuse.security:def:33448
    P
    Security update for glib2
    2020-12-01
    oval:org.opensuse.security:def:28701
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32444
    P
    Security update for xen (Important)
    2020-12-01
    oval:org.opensuse.security:def:28183
    P
    Security update for various KMPs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31987
    P
    Security update for java-1_7_1-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:28761
    P
    Security update for libqt4
    2020-12-01
    oval:org.opensuse.security:def:32656
    P
    enscript on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28324
    P
    Security update for perl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31999
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:32744
    P
    logwatch on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28560
    P
    Security update for hplip
    2020-12-01
    oval:org.opensuse.security:def:27978
    P
    Security update for MozillaFirefox (Critical)
    2020-12-01
    oval:org.opensuse.security:def:32810
    P
    xorg-x11-libs-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28662
    P
    Security update for finch
    2020-12-01
    oval:org.opensuse.security:def:32357
    P
    Security update for squid3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:28053
    P
    Security update for cvs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33487
    P
    Security update for libpoppler4
    2020-12-01
    oval:org.opensuse.security:def:28717
    P
    Security update for kdebase4-workspace
    2020-12-01
    oval:org.opensuse.security:def:32600
    P
    quagga on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28267
    P
    Security update for mercurial (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:13235
    P
    DSA-1793-1 kdegraphics -- multiple
    2015-02-23
    oval:org.mitre.oval:def:7864
    P
    DSA-1793 kdegraphics -- multiple vulnerabilities
    2015-02-23
    oval:org.mitre.oval:def:13355
    P
    USN-973-1 -- koffice vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:7718
    P
    DSA-1790 xpdf -- multiple vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:13119
    P
    DSA-1790-1 xpdf -- multiple
    2014-06-23
    oval:org.debian:def:1793
    V
    multiple vulnerabilities
    2009-05-06
    oval:org.debian:def:1790
    V
    multiple vulnerabilities
    2009-05-05
    oval:com.ubuntu.cosmic:def:200901650000000
    V
    CVE-2009-0165 on Ubuntu 18.10 (cosmic) - low.
    2009-04-23
    oval:com.ubuntu.artful:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 17.10 (artful) - low.
    2009-04-23
    oval:com.ubuntu.trusty:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 14.04 LTS (trusty) - low.
    2009-04-23
    oval:com.ubuntu.bionic:def:200901650000000
    V
    CVE-2009-0165 on Ubuntu 18.04 LTS (bionic) - low.
    2009-04-23
    oval:com.ubuntu.bionic:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 18.04 LTS (bionic) - low.
    2009-04-23
    oval:com.ubuntu.xenial:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 16.04 LTS (xenial) - low.
    2009-04-23
    oval:com.ubuntu.xenial:def:200901650000000
    V
    CVE-2009-0165 on Ubuntu 16.04 LTS (xenial) - low.
    2009-04-23
    oval:com.ubuntu.cosmic:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 18.10 (cosmic) - low.
    2009-04-23
    oval:com.ubuntu.disco:def:200901650000000
    V
    CVE-2009-0165 on Ubuntu 19.04 (disco) - low.
    2009-04-23
    oval:com.ubuntu.precise:def:20090165000
    V
    CVE-2009-0165 on Ubuntu 12.04 LTS (precise) - low.
    2009-04-23
    BACK
    foolabs xpdf 0.5a
    foolabs xpdf 0.7a
    foolabs xpdf 0.91a
    foolabs xpdf 0.91b
    foolabs xpdf 0.91c
    foolabs xpdf 0.92a
    foolabs xpdf 0.92b
    foolabs xpdf 0.92c
    foolabs xpdf 0.92d
    foolabs xpdf 0.92e
    foolabs xpdf 0.93a
    foolabs xpdf 0.93b
    foolabs xpdf 0.93c
    foolabs xpdf 1.00a
    foolabs xpdf 3.0.1
    glyphandcog xpdfreader 0.2
    glyphandcog xpdfreader 0.3
    glyphandcog xpdfreader 0.4
    glyphandcog xpdfreader 0.5
    glyphandcog xpdfreader 0.6
    glyphandcog xpdfreader 0.7
    glyphandcog xpdfreader 0.80
    glyphandcog xpdfreader 0.90
    glyphandcog xpdfreader 0.91
    glyphandcog xpdfreader 0.92
    glyphandcog xpdfreader 0.93
    glyphandcog xpdfreader 1.00
    glyphandcog xpdfreader 1.01
    glyphandcog xpdfreader 2.00
    glyphandcog xpdfreader 2.01
    glyphandcog xpdfreader 2.02
    glyphandcog xpdfreader 2.03
    glyphandcog xpdfreader 3.00
    glyphandcog xpdfreader 3.01
    glyphandcog xpdfreader *
    poppler poppler *
    foolabs xpdf 3.01
    apple mac os x 10.5
    foolabs xpdf 3.02
    apple mac os x server 10.5
    apple mac os x 10.4.11
    apple mac os x 10.5.1
    apple mac os x server 10.4.11
    apple mac os x server 10.5.1
    apple mac os x 10.5.2
    apple mac os x server 10.5.2
    apple mac os x server 10.5.3
    apple mac os x 10.5.3
    apple mac os x 10.5.4
    apple mac os x server 10.5.4
    apple mac os x 10.5.5
    apple mac os x server 10.5.5
    apple mac os x 10.5.6
    apple mac os x server 10.5.6
    foolabs xpdf 0.90
    foolabs xpdf 0.80
    foolabs xpdf 0.7a
    foolabs xpdf 0.4
    foolabs xpdf 0.3
    foolabs xpdf 0.2
    foolabs xpdf 0.7
    foolabs xpdf 0.6
    foolabs xpdf 0.5a
    foolabs xpdf 0.5 a
    foolabs xpdf 0.91a
    foolabs xpdf 0.92
    foolabs xpdf 0.91
    foolabs xpdf 0.91c
    foolabs xpdf 0.91b
    foolabs xpdf 0.92c
    foolabs xpdf 0.92d
    foolabs xpdf 0.92a
    foolabs xpdf 0.92b
    foolabs xpdf 0.92e
    foolabs xpdf 1.00 a
    foolabs xpdf 1.01
    foolabs xpdf 0.93c
    foolabs xpdf 1.00a
    foolabs xpdf 2.02
    foolabs xpdf 2.00
    foolabs xpdf 2.01
    foolabs xpdf 0.93a
    foolabs xpdf 0.93b
    foolabs xpdf 0.93 b
    foolabs xpdf 2.03
    foolabs xpdf 3.0.1
    foolabs xpdf 3.00
    mandrakesoft mandrake linux corporate server 3.0
    novell linux desktop 9
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    novell open enterprise server *
    novell opensuse 10.3
    mandrakesoft mandrake linux 2008.1
    novell opensuse 11.0
    novell suse linux enterprise server 10 sp2
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva enterprise server 5
    mandriva enterprise server 5