Show plain JSON{"id": "CVE-2009-0791", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-06-09T17:30:00.267", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/35340", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/35685", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37023", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37028", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37037", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37043", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37077", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/37079", "source": "secalert@redhat.com"}, {"url": "http://securitytracker.com/id?1022326", "source": "secalert@redhat.com"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:334", "source": "secalert@redhat.com"}, {"url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/35195", "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2009/1488", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2009/2928", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50941", "source": "secalert@redhat.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10534", "source": "secalert@redhat.com"}, {"url": "https://rhn.redhat.com/errata/RHSA-2009-1500.html", "source": "secalert@redhat.com"}, {"url": "https://rhn.redhat.com/errata/RHSA-2009-1501.html", "source": "secalert@redhat.com"}, {"url": "https://rhn.redhat.com/errata/RHSA-2009-1502.html", "source": "secalert@redhat.com"}, {"url": "https://rhn.redhat.com/errata/RHSA-2009-1503.html", "source": "secalert@redhat.com"}, {"url": "https://rhn.redhat.com/errata/RHSA-2009-1512.html", "source": "secalert@redhat.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-189"}]}], "descriptions": [{"lang": "en", "value": "Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179."}, {"lang": "es", "value": "M\u00faltiples desbordamientos de entero en el filtro pdftops en CUPS v1.1.17, v1.1.22 y v1.3.7 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero PDF manipulado que dispara una desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap), posiblemente relacionado con (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx y (5) PSOutputDev.cxx en pdftops/. NOTA: el vector JBIG2Stream.cxx podr\u00eda solapar CVE-2009-1179."}], "lastModified": "2023-02-13T02:19:45.823", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F"}, {"criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC"}, {"criteria": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69BD64BB-BDA7-4F82-8324-B7C7C941133C"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}