Vulnerability Name:

CVE-2009-0195 (CCN-50128)

Assigned:2009-04-16
Published:2009-04-16
Updated:2019-03-06
Summary:Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-0195

Source: CCN
Type: RHSA-2009-0429
Important: cups security update

Source: CCN
Type: RHSA-2009-0430
Important: xpdf security update

Source: CCN
Type: RHSA-2009-0431
Important: kdegraphics security update

Source: CCN
Type: RHSA-2009-0458
Important: gpdf security update

Source: REDHAT
Type: UNKNOWN
RHSA-2009:0458

Source: CCN
Type: RHSA-2009-0480
Important: poppler security update

Source: CCN
Type: RHSA-2010-0399
Moderate: tetex security update

Source: CCN
Type: RHSA-2010-0400
Moderate: tetex security update

Source: CCN
Type: SA34291
Xpdf JBIG2 Processing Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
34291

Source: CCN
Type: SA34481
CUPS Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
34481

Source: SECUNIA
Type: UNKNOWN
34756

Source: SECUNIA
Type: UNKNOWN
34963

Source: SECUNIA
Type: UNKNOWN
35064

Source: CCN
Type: Secunia Research 17/04/2009
Xpdf JBIG2 Symbol Dictionary Buffer Overflow Vulnerability

Source: MISC
Type: Vendor Advisory
http://secunia.com/secunia_research/2009-17/

Source: MISC
Type: Vendor Advisory
http://secunia.com/secunia_research/2009-18/

Source: CCN
Type: SourceForge.net: Files
PDFedit, File Release Notes and Changelog, Release Name: 0.4.3

Source: CCN
Type: CUPS Web site
CUPS

Source: CCN
Type: Xpdf Web page
Xpdf

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:087

Source: REDHAT
Type: UNKNOWN
RHSA-2009:0480

Source: BUGTRAQ
Type: UNKNOWN
20090417 Secunia Research: CUPS pdftops JBIG2 Symbol Dictionary Buffer Overflow

Source: BUGTRAQ
Type: UNKNOWN
20090417 Secunia Research: Xpdf JBIG2 Symbol Dictionary Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
34791

Source: CCN
Type: BID-34791
CUPS and Xpdf JBIG2 Symbol Dictionary Processing Heap Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2010-1040

Source: XF
Type: UNKNOWN
multiple-jbig2-symboldictionary-bo(50128)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10076

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:cups:1.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:* (Version <= 3.02)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/a:redhat:rhel_productivity:5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
  • OR cpe:/a:apple:cups:1.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.5:a:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00:a:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:0.93:b:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
  • OR cpe:/a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:28869
    P
    RHSA-2009:0480 -- poppler security update (Important)
    2015-08-17
    oval:org.mitre.oval:def:29193
    P
    RHSA-2009:0431 -- kdegraphics security update (Important)
    2015-08-17
    oval:org.mitre.oval:def:28592
    P
    RHSA-2009:0429 -- cups security update (Important)
    2015-08-17
    oval:org.mitre.oval:def:23168
    P
    ELSA-2010:0400: tetex security update (Moderate)
    2014-07-21
    oval:org.mitre.oval:def:13355
    P
    USN-973-1 -- koffice vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:22616
    P
    ELSA-2009:0431: kdegraphics security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21858
    P
    ELSA-2009:0429: cups security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21897
    P
    ELSA-2009:0480: poppler security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:22251
    P
    RHSA-2010:0400: tetex security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:10076
    V
    Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
    2013-04-29
    oval:com.redhat.rhsa:def:20100399
    P
    RHSA-2010:0399: tetex security update (Moderate)
    2010-05-06
    oval:com.redhat.rhsa:def:20100400
    P
    RHSA-2010:0400: tetex security update (Moderate)
    2010-05-06
    oval:com.redhat.rhsa:def:20090480
    P
    RHSA-2009:0480: poppler security update (Important)
    2009-05-13
    oval:com.redhat.rhsa:def:20090458
    P
    RHSA-2009:0458: gpdf security update (Important)
    2009-04-30
    oval:com.ubuntu.artful:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 17.10 (artful) - medium.
    2009-04-23
    oval:com.ubuntu.xenial:def:200901950000000
    V
    CVE-2009-0195 on Ubuntu 16.04 LTS (xenial) - medium.
    2009-04-23
    oval:com.ubuntu.trusty:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 14.04 LTS (trusty) - medium.
    2009-04-23
    oval:com.ubuntu.bionic:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 18.04 LTS (bionic) - medium.
    2009-04-23
    oval:com.ubuntu.disco:def:200901950000000
    V
    CVE-2009-0195 on Ubuntu 19.04 (disco) - medium.
    2009-04-23
    oval:com.ubuntu.xenial:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 16.04 LTS (xenial) - medium.
    2009-04-23
    oval:com.ubuntu.cosmic:def:200901950000000
    V
    CVE-2009-0195 on Ubuntu 18.10 (cosmic) - medium.
    2009-04-23
    oval:com.ubuntu.cosmic:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 18.10 (cosmic) - medium.
    2009-04-23
    oval:com.ubuntu.bionic:def:200901950000000
    V
    CVE-2009-0195 on Ubuntu 18.04 LTS (bionic) - medium.
    2009-04-23
    oval:com.ubuntu.precise:def:20090195000
    V
    CVE-2009-0195 on Ubuntu 12.04 LTS (precise) - medium.
    2009-04-23
    oval:com.redhat.rhsa:def:20090429
    P
    RHSA-2009:0429: cups security update (Important)
    2009-04-16
    oval:com.redhat.rhsa:def:20090430
    P
    RHSA-2009:0430: xpdf security update (Important)
    2009-04-16
    oval:com.redhat.rhsa:def:20090431
    P
    RHSA-2009:0431: kdegraphics security update (Important)
    2009-04-16
    BACK
    apple cups 1.3.9
    foolabs xpdf 0.5a
    foolabs xpdf 0.7a
    foolabs xpdf 0.91a
    foolabs xpdf 0.91b
    foolabs xpdf 0.91c
    foolabs xpdf 0.92a
    foolabs xpdf 0.92b
    foolabs xpdf 0.92c
    foolabs xpdf 0.92d
    foolabs xpdf 0.92e
    foolabs xpdf 0.93a
    foolabs xpdf 0.93b
    foolabs xpdf 0.93c
    foolabs xpdf 1.00a
    foolabs xpdf 3.0.1
    glyphandcog xpdfreader 0.2
    glyphandcog xpdfreader 0.3
    glyphandcog xpdfreader 0.4
    glyphandcog xpdfreader 0.5
    glyphandcog xpdfreader 0.6
    glyphandcog xpdfreader 0.7
    glyphandcog xpdfreader 0.80
    glyphandcog xpdfreader 0.90
    glyphandcog xpdfreader 0.91
    glyphandcog xpdfreader 0.92
    glyphandcog xpdfreader 0.93
    glyphandcog xpdfreader 1.00
    glyphandcog xpdfreader 1.01
    glyphandcog xpdfreader 2.00
    glyphandcog xpdfreader 2.01
    glyphandcog xpdfreader 2.02
    glyphandcog xpdfreader 2.03
    glyphandcog xpdfreader 3.00
    glyphandcog xpdfreader *
    foolabs xpdf 3.02
    apple cups 1.3.9
    foolabs xpdf 0.90
    foolabs xpdf 0.80
    foolabs xpdf 0.7a
    foolabs xpdf 0.4
    foolabs xpdf 0.3
    foolabs xpdf 0.2
    foolabs xpdf 0.7
    foolabs xpdf 0.6
    foolabs xpdf 0.5a
    foolabs xpdf 0.5 a
    foolabs xpdf 0.91a
    foolabs xpdf 0.92
    foolabs xpdf 0.91
    foolabs xpdf 0.91c
    foolabs xpdf 0.91b
    foolabs xpdf 0.92c
    foolabs xpdf 0.92d
    foolabs xpdf 0.92a
    foolabs xpdf 0.92b
    foolabs xpdf 0.92e
    foolabs xpdf 1.00 a
    foolabs xpdf 1.01
    foolabs xpdf 0.93c
    foolabs xpdf 1.00a
    foolabs xpdf 2.02
    foolabs xpdf 2.00
    foolabs xpdf 2.01
    foolabs xpdf 0.93a
    foolabs xpdf 0.93b
    foolabs xpdf 0.93 b
    foolabs xpdf 2.03
    foolabs xpdf 3.0.1
    foolabs xpdf 3.00
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    mandriva enterprise server 5
    mandriva enterprise server 5