Summary
The PDF viewer Xpdf is prone to multiple vulnerabilities on Linux systems that can lead to arbitrary code execution.
Impact
Successful exploitation will let the attacker craft a malicious PDF File and execute arbitrary codes into the context of the affected application to cause denial of service attacks, buffer overflow attacks, remote code executions etc.
Solution
Apply Xpdf v3.02 pl3 patch: ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl3.patch
Insight
- Integer overflow in Xpdf JBIG2 Decoder which allows the attacker create a malicious crafted PDF File and causes code execution.
- Flaws in Xpdf JBIG2 Decoder which causes buffer overflow, freeing of arbitrary memory causing Xpdf application to crash.
Affected
Xpdf version 3.02 and prior on Linux.
Detection
This test uses the xpdf detection results and checks version of each binary found on the target system. Version 3.02 and prior will raise a security alert.
References
Severity
Classification
-
CVE CVE-2009-0146, CVE-2009-0147, CVE-2009-0165, CVE-2009-0166, CVE-2009-0195, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Photoshop PNG Image Processing Buffer Overflow Vulnerabilities (Mac OS X)
- Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Win)
- Apple iTunes 'itpc:' URI Buffer Overflow Vulnerability
- Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Linux)
- Adobe Reader/Acrobat Multiple BOF Vulnerabilities - Jun09 (Win)