VYPR
Unrated severityNVD Advisory· Published Apr 23, 2009· Updated Apr 23, 2026

CVE-2009-0146

CVE-2009-0146

Description

Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.

Affected products

106
  • Apple Inc./Cups72 versions
    cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*+ 71 more
    • cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*range: <=1.3.9
    • cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*+ 13 more
    • cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
    • cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
  • cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*+ 19 more
    • cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*range: <=3.02
    • cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
    • cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

51

News mentions

0

No linked articles in our index yet.