2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0756" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-03-03T16:30:05.267" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:00:50.907" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n JBIG2Stream::readSymbolDictSeg en Poppler anteriores a v0.10.4 permite a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un fichero PDF que dispara un error de parseo, lo cual no adecuadamente manejado por JBIG2SymbolDict::~JBIG2SymbolDict y produce una desreferencia de memoria incorrecta."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.10.3" ,
"matchCriteriaId" : "D94A745A-9BB3-4EE9-AC87-CACA64FB5C81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E23EBF88-10DE-4EA6-9F0E-F33C88541F65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54F75CFD-3523-4017-992C-4FA6406D49F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB116A19-6436-40BE-B5C6-32C22D888B9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A4C1429-593B-47B6-AC84-832F2296FAB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18240BA6-3390-4925-AC25-DA4C42397CF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3090A142-2240-4A8D-A122-C037931A277C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EFD63240-4599-4212-8AF2-7C4089CA9D28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C7EE965-EE3F-4B17-AF38-FA3AA0B11164"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BE488E5-B3D9-4723-ABBA-A8753EC2DA2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1259C59E-517F-40BE-8BA6-01AB76257C9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "576152B4-9ACD-4C4E-B423-4A5EF44332D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "322F9E62-6A74-4805-8F6B-9C61739B2D4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F51C453F-6A87-49FB-83F6-22316F28161F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75F532F0-6653-4275-A85A-BD9A9A611E96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CC7300E-0CBE-47FD-A241-B4B4F0164EBB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "255102DA-A2C0-4795-9539-B4CBD587554A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "349B06F1-772A-4A12-A7B9-EA220ED96D2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B779800A-FF4B-47DD-B56F-77D10D6A335C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F0213390-08FA-4E04-835B-8BE0FC61B464"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B304657-740A-4F8D-99CD-22E283FEE6F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "178680C2-DB1B-4250-9B6E-6ADABA60DE44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FCA9036F-92DA-45C2-9FBC-DE03444D34F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6855B98-DAA2-4850-A765-2F4D6D93A424"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4743EC55-B61D-4C1A-9ED7-060268F2DB27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8CD4454E-3D2B-4582-B5E5-0317A6417654"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96402B67-A7A8-44E3-914E-A10A69FAD735"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66C608C8-F382-4D6B-A638-98763C1CBB66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21F0F4E0-91B7-4B1F-BFA9-829101A7F90A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22287102-80B1-4E1F-85E4-488B020A51E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A940AF2-A7CA-408F-86E2-797C7BA8A6BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58A5D199-E952-44B5-B5E5-170040FA813E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "349B4B75-32E2-49FB-9606-8B057AFA2E3E"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://bugs.freedesktop.org/show_bug.cgi?id=19702" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://lists.freedesktop.org/archives/poppler/2009-January/004403.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/33853" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35685" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://wiki.rpath.com/Advisories:rPSA-2009-0059" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/02/13/1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/02/19/2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/502761/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/33749" ,
"source" : "cve@mitre.org"
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://bugs.freedesktop.org/show_bug.cgi?id=19702" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://lists.freedesktop.org/archives/poppler/2009-January/004403.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/33853" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35685" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://wiki.rpath.com/Advisories:rPSA-2009-0059" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/02/13/1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/02/19/2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/502761/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/33749" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "This issue is a duplicate of CVE-2009-0166, which was addressed in affected products via following updates: https://rhn.redhat.com/errata/CVE-2009-0166.html" ,
"lastModified" : "2009-07-15T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}