Executive Summary

Informations
Name CVE-2009-4035 First vendor Publication 2009-12-21
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10996
 
Oval ID: oval:org.mitre.oval:def:10996
Title: The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
Description: The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
Family: unix Class: vulnerability
Reference(s): CVE-2009-4035
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 1
Application 1

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for xpdf CESA-2009:1680 centos4 i386
File : nvt/gb_CESA-2009_1680_xpdf_centos4_i386.nasl
2011-08-09 Name : CentOS Update for gpdf CESA-2009:1681 centos4 i386
File : nvt/gb_CESA-2009_1681_gpdf_centos4_i386.nasl
2011-08-09 Name : CentOS Update for kdegraphics CESA-2009:1682 centos4 i386
File : nvt/gb_CESA-2009_1682_kdegraphics_centos4_i386.nasl
2009-12-30 Name : RedHat Security Advisory RHSA-2009:1680
File : nvt/RHSA_2009_1680.nasl
2009-12-30 Name : RedHat Security Advisory RHSA-2009:1681
File : nvt/RHSA_2009_1681.nasl
2009-12-30 Name : RedHat Security Advisory RHSA-2009:1682
File : nvt/RHSA_2009_1682.nasl
2009-12-30 Name : CentOS Security Advisory CESA-2009:1680 (xpdf)
File : nvt/ovcesa2009_1680.nasl
2009-12-30 Name : CentOS Security Advisory CESA-2009:1681 (gpdf)
File : nvt/ovcesa2009_1681.nasl
2009-12-30 Name : CentOS Security Advisory CESA-2009:1682 (kdegraphics)
File : nvt/ovcesa2009_1682.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
61207 KDE KPDF xpdf/fofi/FoFiType1.cc FoFiType1::parse() Function Overflow

Nessus® Vulnerability Scanner

Date Description
2014-02-18 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201402-17.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2009-1680.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2009-1681.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1682.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20091216_kdegraphics_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20091216_xpdf_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20091216_gpdf_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2010-10-11 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_poppler-6743.nasl - Type : ACT_GATHER_INFO
2010-01-12 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_libpoppler-devel-100111.nasl - Type : ACT_GATHER_INFO
2010-01-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_libpoppler-devel-091223.nasl - Type : ACT_GATHER_INFO
2010-01-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_libpoppler-devel-091222.nasl - Type : ACT_GATHER_INFO
2010-01-03 Name : The remote SuSE system is missing a security patch for libpoppler-devel
File : suse_11_2_libpoppler-devel-091222.nasl - Type : ACT_GATHER_INFO
2010-01-03 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libpoppler-devel-091221.nasl - Type : ACT_GATHER_INFO
2010-01-03 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_poppler-6751.nasl - Type : ACT_GATHER_INFO
2009-12-21 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2009-1680.nasl - Type : ACT_GATHER_INFO
2009-12-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1682.nasl - Type : ACT_GATHER_INFO
2009-12-21 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2009-1681.nasl - Type : ACT_GATHER_INFO
2009-12-17 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2009-1681.nasl - Type : ACT_GATHER_INFO
2009-12-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1682.nasl - Type : ACT_GATHER_INFO
2009-12-17 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2009-1680.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/37350
CONFIRM http://cgit.freedesktop.org/poppler/poppler/diff/fofi/FoFiType1.cc?id=4b4fc5c0
https://bugzilla.redhat.com/show_bug.cgi?id=541614
MISC http://cgit.freedesktop.org/poppler/poppler/tree/fofi/FoFiType1.cc?id=4b4fc5c...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2009-1680.html
http://www.redhat.com/support/errata/RHSA-2009-1681.html
http://www.redhat.com/support/errata/RHSA-2009-1682.html
SECTRACK http://www.securitytracker.com/id?1023356
SECUNIA http://secunia.com/advisories/37641
http://secunia.com/advisories/37781
http://secunia.com/advisories/37787
http://secunia.com/advisories/37793
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html
VUPEN http://www.vupen.com/english/advisories/2009/3555
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/54831

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:10:31
  • Multiple Updates
2021-04-22 01:10:58
  • Multiple Updates
2020-05-23 00:24:38
  • Multiple Updates
2017-09-19 09:23:30
  • Multiple Updates
2017-08-17 09:22:47
  • Multiple Updates
2016-04-26 19:16:15
  • Multiple Updates
2014-02-19 13:21:50
  • Multiple Updates
2014-02-17 10:52:27
  • Multiple Updates
2013-05-11 00:01:33
  • Multiple Updates