CVE-2009-3604

N/A Unknown
Published: October 21, 2009 Modified: April 23, 2026
View on NVD

Description

The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Source: secalert@redhat.com
Patch
http://secunia.com/advisories/37023
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37028
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37037
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37042
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37043
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37053
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37077
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37079
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37114
Source: secalert@redhat.com
http://secunia.com/advisories/37159
Source: secalert@redhat.com
http://secunia.com/advisories/39327
Source: secalert@redhat.com
http://secunia.com/advisories/39938
Source: secalert@redhat.com
http://securitytracker.com/id?1023029
Source: secalert@redhat.com
http://site.pi3.com.pl/adv/xpdf.txt
Source: secalert@redhat.com
Exploit
http://www.securityfocus.com/bid/36703
Source: secalert@redhat.com
Exploit Patch
http://www.ubuntu.com/usn/USN-850-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-850-3
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2009/2924
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928
Source: secalert@redhat.com
Patch Vendor Advisory
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37023
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37028
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37037
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37042
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37043
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37053
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37077
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37079
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37114
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37159
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39327
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39938
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1023029
Source: af854a3a-2127-422b-91ae-364da2661108
http://site.pi3.com.pl/adv/xpdf.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-2028
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-2050
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/36703
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.ubuntu.com/usn/USN-850-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-850-3
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2924
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/0802
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1040
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1220
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=526911
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/53795
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1500.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1501.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1502.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1503.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1512.html
Source: af854a3a-2127-422b-91ae-364da2661108

92 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.5%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

glyphandcog poppler foolabs gnome kde