{"id":"CVE-2009-0195","details":"Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.","modified":"2025-08-09T19:01:28Z","published":"2009-04-23T17:30:01Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2009-0458.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34291"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34481"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34756"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34963"},{"type":"ADVISORY","url":"http://secunia.com/advisories/35064"},{"type":"ADVISORY","url":"http://secunia.com/secunia_research/2009-17/"},{"type":"ADVISORY","url":"http://secunia.com/secunia_research/2009-18/"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:087"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/1040"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2009-0480.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/502759/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/502762/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/34791"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10076"}],"schema_version":"1.7.3"}