Search for vulnerabilities
Vulnerability details: VCID-j3uj-ckf2-aaah
Vulnerability ID VCID-j3uj-ckf2-aaah
Aliases CVE-2009-3606
Summary Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2009/CVE-2009-3606.html
rhas Important https://access.redhat.com/errata/RHSA-2009:0458
rhas Important https://access.redhat.com/errata/RHSA-2009:0480
rhas Important https://access.redhat.com/errata/RHSA-2009:1500
rhas Important https://access.redhat.com/errata/RHSA-2009:1501
rhas Important https://access.redhat.com/errata/RHSA-2009:1502
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.05932 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.06276 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.07846 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.07846 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.07846 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.07846 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
epss 0.09703 https://api.first.org/data/v1/epss?cve=CVE-2009-3606
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2009-3606
generic_textual Medium https://ubuntu.com/security/notices/USN-973-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-973-1
Reference id Reference type URL
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch
http://cgit.freedesktop.org/poppler/poppler/diff/poppler/PSOutputDev.cc?id=7b2d314a61
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
http://people.canonical.com/~ubuntu-security/cve/2009/CVE-2009-3606.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
https://api.first.org/data/v1/epss?cve=CVE-2009-3606
https://bugzilla.redhat.com/show_bug.cgi?id=526877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
http://secunia.com/advisories/37023
http://secunia.com/advisories/37037
http://secunia.com/advisories/37042
http://secunia.com/advisories/37043
http://secunia.com/advisories/37053
http://secunia.com/advisories/37077
http://secunia.com/advisories/37159
http://secunia.com/advisories/39327
http://secunia.com/advisories/39938
http://securitytracker.com/id?1023029
https://exchange.xforce.ibmcloud.com/vulnerabilities/53798
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11289
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7836
https://rhn.redhat.com/errata/RHSA-2009-1500.html
https://rhn.redhat.com/errata/RHSA-2009-1501.html
https://rhn.redhat.com/errata/RHSA-2009-1502.html
https://ubuntu.com/security/notices/USN-973-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
https://usn.ubuntu.com/usn/usn-973-1
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
http://www.debian.org/security/2009/dsa-1941
http://www.debian.org/security/2010/dsa-2028
http://www.debian.org/security/2010/dsa-2050
http://www.mandriva.com/security/advisories?name=MDVSA-2009:287
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
http://www.openwall.com/lists/oss-security/2009/12/01/1
http://www.openwall.com/lists/oss-security/2009/12/01/5
http://www.openwall.com/lists/oss-security/2009/12/01/6
http://www.securityfocus.com/bid/36703
http://www.vupen.com/english/advisories/2009/2924
http://www.vupen.com/english/advisories/2009/2928
http://www.vupen.com/english/advisories/2010/0802
http://www.vupen.com/english/advisories/2010/1040
http://www.vupen.com/english/advisories/2010/1220
551287 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
CVE-2009-3606 https://nvd.nist.gov/vuln/detail/CVE-2009-3606
GLSA-201310-03 https://security.gentoo.org/glsa/201310-03
RHSA-2009:0458 https://access.redhat.com/errata/RHSA-2009:0458
RHSA-2009:0480 https://access.redhat.com/errata/RHSA-2009:0480
RHSA-2009:1500 https://access.redhat.com/errata/RHSA-2009:1500
RHSA-2009:1501 https://access.redhat.com/errata/RHSA-2009:1501
RHSA-2009:1502 https://access.redhat.com/errata/RHSA-2009:1502
USN-973-1 https://usn.ubuntu.com/973-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-3606
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93660
EPSS Score 0.05932
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.