Debian DSA-1941-1 : poppler - several vulnerabilities

high Nessus Plugin ID 44806



The remote Debian host is missing a security-related update.


Several integer overflows, buffer overflows and memory allocation errors were discovered in the Poppler PDF rendering library, which may lead to denial of service or the execution of arbitrary code if a user is tricked into opening a malformed PDF document.

An update for the old stable distribution (etch) will be issued soon as version 0.4.5-5.1etch4.


Upgrade the poppler packages.

For the stable distribution (lenny), these problems have been fixed in version 0.8.7-3.

See Also

Plugin Details

Severity: High

ID: 44806

File Name: debian_DSA-1941.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:poppler, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/25/2009

Vulnerability Publication Date: 3/3/2009

Reference Information

CVE: CVE-2009-0755, CVE-2009-0756, CVE-2009-3604, CVE-2009-3605, CVE-2009-3606, CVE-2009-3607, CVE-2009-3608, CVE-2009-3609, CVE-2009-3903, CVE-2009-3904, CVE-2009-3905, CVE-2009-3909, CVE-2009-3938

BID: 36703, 36718, 36976

DSA: 1941

CWE: 79, 119, 189, 264, 399