HomeFoolabsCVE-2009-1180

CVE-2009-1180

UNKNOWN
6.8CVSS
Published: 2009-04-23
Updated: 2025-04-09
AI Analysis

Description

The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.

CVSS Metrics

Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
medium
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
CWE-399

Metadata

Primary Vendor
FOOLABS
Published
4/23/2009
Last Modified
4/9/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

foolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdffoolabs : xpdfglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderglyphandcog : xpdfreaderpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerpoppler : popplerapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cupsapple : cups

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2009-1180 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com