CVE-2009-3608

N/A Unknown
Published: October 21, 2009 Modified: April 23, 2026
View on NVD

Description

Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Source: secalert@redhat.com
Patch
http://poppler.freedesktop.org/
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/37028
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37034
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37037
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37043
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37051
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37053
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37054
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37061
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37077
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37079
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37114
Source: secalert@redhat.com
http://secunia.com/advisories/37159
Source: secalert@redhat.com
http://secunia.com/advisories/39327
Source: secalert@redhat.com
http://secunia.com/advisories/39938
Source: secalert@redhat.com
http://securitytracker.com/id?1023029
Source: secalert@redhat.com
Patch
http://www.securityfocus.com/bid/36703
Source: secalert@redhat.com
Exploit Patch
http://www.ubuntu.com/usn/USN-850-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-850-3
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2009/2924
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2925
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2926
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928
Source: secalert@redhat.com
Vendor Advisory
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://poppler.freedesktop.org/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/37028
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37034
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37037
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37043
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37051
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37053
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37054
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37061
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37077
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37079
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37114
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37159
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39327
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39938
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1023029
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1941
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-2028
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-2050
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:334
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ocert.org/advisories/ocert-2009-016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/12/01/1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/12/01/5
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/12/01/6
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/36703
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.ubuntu.com/usn/USN-850-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-850-3
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2924
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2925
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2926
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2928
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0802
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1220
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=526637
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/53794
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1501.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1502.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1503.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1504.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1512.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1513.html
Source: af854a3a-2127-422b-91ae-364da2661108

106 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
12.7%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

glyph_and_cog kde foolabs tetex gnome glyphandcog poppler