idx
int64 0
522k
| project
stringclasses 631
values | commit_id
stringlengths 7
40
| project_url
stringclasses 630
values | commit_url
stringlengths 4
164
| commit_message
stringlengths 0
11.5k
| target
int64 0
1
| func
stringlengths 5
484k
| func_hash
float64 1,559,120,642,045,605,000,000,000B
340,279,892,905,069,500,000,000,000,000B
| file_name
stringlengths 4
45
| file_hash
float64 25,942,829,220,065,710,000,000,000B
340,272,304,251,680,200,000,000,000,000B
β | cwe
sequencelengths 0
1
| cve
stringlengths 4
16
| cve_desc
stringlengths 0
2.3k
| nvd_url
stringlengths 37
49
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11,734 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2CodeTable::JBIG2CodeTable(Guint segNumA, JBIG2HuffmanTable *tableA):
JBIG2Segment(segNumA)
{
table = tableA;
}
| 28,269,530,307,054,730,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,735 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2HuffmanDecoder::JBIG2HuffmanDecoder() {
str = NULL;
reset();
}
| 201,200,835,847,730,040,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,736 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2MMRDecoder::JBIG2MMRDecoder() {
str = NULL;
reset();
}
| 231,141,987,891,569,920,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,737 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2PatternDict::JBIG2PatternDict(Guint segNumA, Guint sizeA):
JBIG2Segment(segNumA)
{
size = sizeA;
bitmaps = (JBIG2Bitmap **)gmallocn(size, sizeof(JBIG2Bitmap *));
}
| 280,908,559,627,476,930,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,738 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Segment(Guint segNumA) { segNum = segNumA; }
| 145,598,375,085,215,260,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,739 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Stream::JBIG2Stream(Stream *strA, Object *globalsStreamA):
FilterStream(strA)
{
pageBitmap = NULL;
arithDecoder = new JArithmeticDecoder();
genericRegionStats = new JArithmeticDecoderStats(1 << 1);
refinementRegionStats = new JArithmeticDecoderStats(1 << 1);
iadhStats = new JArithmeticDecoderStats(1 << 9);
iadwStats = new JArithmeticDecoderStats(1 << 9);
iaexStats = new JArithmeticDecoderStats(1 << 9);
iaaiStats = new JArithmeticDecoderStats(1 << 9);
iadtStats = new JArithmeticDecoderStats(1 << 9);
iaitStats = new JArithmeticDecoderStats(1 << 9);
iafsStats = new JArithmeticDecoderStats(1 << 9);
iadsStats = new JArithmeticDecoderStats(1 << 9);
iardxStats = new JArithmeticDecoderStats(1 << 9);
iardyStats = new JArithmeticDecoderStats(1 << 9);
iardwStats = new JArithmeticDecoderStats(1 << 9);
iardhStats = new JArithmeticDecoderStats(1 << 9);
iariStats = new JArithmeticDecoderStats(1 << 9);
iaidStats = new JArithmeticDecoderStats(1 << 1);
huffDecoder = new JBIG2HuffmanDecoder();
mmrDecoder = new JBIG2MMRDecoder();
globalsStreamA->copy(&globalsStream);
segments = globalSegments = NULL;
curStr = NULL;
dataPtr = dataEnd = NULL;
}
| 245,077,798,346,376,940,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,740 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2SymbolDict::JBIG2SymbolDict(Guint segNumA, Guint sizeA):
JBIG2Segment(segNumA)
{
size = sizeA;
bitmaps = (JBIG2Bitmap **)gmallocn(size, sizeof(JBIG2Bitmap *));
genericRegionStats = NULL;
refinementRegionStats = NULL;
}
| 338,578,741,306,669,040,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,741 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2HuffmanDecoder::buildTable(JBIG2HuffmanTable *table, Guint len) {
Guint i, j, k, prefix;
JBIG2HuffmanTable tab;
for (i = 0; i < len; ++i) {
for (j = i; j < len && table[j].prefixLen == 0; ++j) ;
if (j == len) {
break;
}
for (k = j + 1; k < len; ++k) {
if (table[k].prefixLen > 0 &&
table[k].prefixLen < table[j].prefixLen) {
j = k;
}
}
if (j != i) {
tab = table[j];
for (k = j; k > i; --k) {
table[k] = table[k - 1];
}
table[i] = tab;
}
}
table[i] = table[len];
i = 0;
prefix = 0;
table[i++].prefix = prefix++;
for (; table[i].rangeLen != jbig2HuffmanEOT; ++i) {
prefix <<= table[i].prefixLen - table[i-1].prefixLen;
table[i].prefix = prefix++;
}
}
| 294,061,745,147,266,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,742 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void clearPixel(int x, int y)
{ data[y * line + (x >> 3)] &= 0x7f7f >> (x & 7); }
| 288,637,281,455,629,930,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,743 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Bitmap::clearToOne() {
memset(data, 0xff, h * line);
}
| 22,362,725,015,915,090,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,744 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Bitmap::clearToZero() {
memset(data, 0, h * line);
}
| 239,031,781,185,621,500,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,745 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::close() {
if (pageBitmap) {
delete pageBitmap;
pageBitmap = NULL;
}
if (segments) {
deleteGooList(segments, JBIG2Segment);
segments = NULL;
}
if (globalSegments) {
deleteGooList(globalSegments, JBIG2Segment);
globalSegments = NULL;
}
dataPtr = dataEnd = NULL;
FilterStream::close();
}
| 242,279,481,818,138,700,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,746 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Bitmap::combine(JBIG2Bitmap *bitmap, int x, int y,
Guint combOp) {
int x0, x1, y0, y1, xx, yy;
Guchar *srcPtr, *destPtr;
Guint src0, src1, src, dest, s1, s2, m1, m2, m3;
GBool oneByte;
if (y < 0) {
y0 = -y;
} else {
y0 = 0;
}
if (y + bitmap->h > h) {
y1 = h - y;
} else {
y1 = bitmap->h;
}
if (y0 >= y1) {
return;
}
if (x >= 0) {
x0 = x & ~7;
} else {
x0 = 0;
}
x1 = x + bitmap->w;
if (x1 > w) {
x1 = w;
}
if (x0 >= x1) {
return;
}
s1 = x & 7;
s2 = 8 - s1;
m1 = 0xff >> (x1 & 7);
m2 = 0xff << (((x1 & 7) == 0) ? 0 : 8 - (x1 & 7));
m3 = (0xff >> s1) & m2;
oneByte = x0 == ((x1 - 1) & ~7);
for (yy = y0; yy < y1; ++yy) {
if (oneByte) {
if (x >= 0) {
destPtr = data + (y + yy) * line + (x >> 3);
srcPtr = bitmap->data + yy * bitmap->line;
dest = *destPtr;
src1 = *srcPtr;
switch (combOp) {
case 0: // or
dest |= (src1 >> s1) & m2;
break;
case 1: // and
dest &= ((0xff00 | src1) >> s1) | m1;
break;
case 2: // xor
dest ^= (src1 >> s1) & m2;
break;
case 3: // xnor
dest ^= ((src1 ^ 0xff) >> s1) & m2;
break;
case 4: // replace
dest = (dest & ~m3) | ((src1 >> s1) & m3);
break;
}
*destPtr = dest;
} else {
destPtr = data + (y + yy) * line;
srcPtr = bitmap->data + yy * bitmap->line + (-x >> 3);
dest = *destPtr;
src1 = *srcPtr;
switch (combOp) {
case 0: // or
dest |= src1 & m2;
break;
case 1: // and
dest &= src1 | m1;
break;
case 2: // xor
dest ^= src1 & m2;
break;
case 3: // xnor
dest ^= (src1 ^ 0xff) & m2;
break;
case 4: // replace
dest = (src1 & m2) | (dest & m1);
break;
}
*destPtr = dest;
}
} else {
if (x >= 0) {
destPtr = data + (y + yy) * line + (x >> 3);
srcPtr = bitmap->data + yy * bitmap->line;
src1 = *srcPtr++;
dest = *destPtr;
switch (combOp) {
case 0: // or
dest |= src1 >> s1;
break;
case 1: // and
dest &= (0xff00 | src1) >> s1;
break;
case 2: // xor
dest ^= src1 >> s1;
break;
case 3: // xnor
dest ^= (src1 ^ 0xff) >> s1;
break;
case 4: // replace
dest = (dest & (0xff << s2)) | (src1 >> s1);
break;
}
*destPtr++ = dest;
xx = x0 + 8;
} else {
destPtr = data + (y + yy) * line;
srcPtr = bitmap->data + yy * bitmap->line + (-x >> 3);
src1 = *srcPtr++;
xx = x0;
}
for (; xx < x1 - 8; xx += 8) {
dest = *destPtr;
src0 = src1;
src1 = *srcPtr++;
src = (((src0 << 8) | src1) >> s1) & 0xff;
switch (combOp) {
case 0: // or
dest |= src;
break;
case 1: // and
dest &= src;
break;
case 2: // xor
dest ^= src;
break;
case 3: // xnor
dest ^= src ^ 0xff;
break;
case 4: // replace
dest = src;
break;
}
*destPtr++ = dest;
}
dest = *destPtr;
src0 = src1;
src1 = *srcPtr++;
src = (((src0 << 8) | src1) >> s1) & 0xff;
switch (combOp) {
case 0: // or
dest |= src & m2;
break;
case 1: // and
dest &= src | m1;
break;
case 2: // xor
dest ^= src & m2;
break;
case 3: // xnor
dest ^= (src ^ 0xff) & m2;
break;
case 4: // replace
dest = (src & m2) | (dest & m1);
break;
}
*destPtr = dest;
}
}
}
| 13,619,673,610,865,680,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,747 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Bitmap *copy() { return new JBIG2Bitmap(0, this); }
| 235,720,837,331,214,980,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,748 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool JBIG2HuffmanDecoder::decodeInt(int *x, JBIG2HuffmanTable *table) {
Guint i, len, prefix;
i = 0;
len = 0;
prefix = 0;
while (table[i].rangeLen != jbig2HuffmanEOT) {
while (len < table[i].prefixLen) {
prefix = (prefix << 1) | readBit();
++len;
}
if (prefix == table[i].prefix) {
if (table[i].rangeLen == jbig2HuffmanOOB) {
return gFalse;
}
if (table[i].rangeLen == jbig2HuffmanLOW) {
*x = table[i].val - readBits(32);
} else if (table[i].rangeLen > 0) {
*x = table[i].val + readBits(table[i].rangeLen);
} else {
*x = table[i].val;
}
return gTrue;
}
++i;
}
return gFalse;
}
| 327,904,148,770,645,600,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,749 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Bitmap::duplicateRow(int yDest, int ySrc) {
memcpy(data + yDest * line, data + ySrc * line, line);
}
| 269,345,986,773,893,100,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,750 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Bitmap::expand(int newH, Guint pixel) {
if (newH <= h || line <= 0 || newH >= (INT_MAX - 1) / line) {
error(-1, "invalid width/height");
gfree(data);
data = NULL;
return;
}
data = (Guchar *)grealloc(data, newH * line + 1);
if (pixel) {
memset(data + h * line, 0xff, (newH - h) * line);
} else {
memset(data + h * line, 0x00, (newH - h) * line);
}
h = newH;
data[h * line] = 0;
}
| 339,890,504,489,277,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,751 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Segment *JBIG2Stream::findSegment(Guint segNum) {
JBIG2Segment *seg;
int i;
for (i = 0; i < globalSegments->getLength(); ++i) {
seg = (JBIG2Segment *)globalSegments->get(i);
if (seg->getSegNum() == segNum) {
return seg;
}
}
for (i = 0; i < segments->getLength(); ++i) {
seg = (JBIG2Segment *)segments->get(i);
if (seg->getSegNum() == segNum) {
return seg;
}
}
return NULL;
}
| 28,112,898,956,734,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,752 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Bitmap *getBitmap(Guint idx) { return bitmaps[idx]; }
| 278,877,336,012,153,580,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,753 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int JBIG2MMRDecoder::getBlackCode() {
const CCITTCode *p;
Guint code;
if (bufLen == 0) {
buf = str->getChar() & 0xff;
bufLen = 8;
++nBytesRead;
}
while (1) {
if (bufLen >= 10 && ((buf >> (bufLen - 6)) & 0x3f) == 0) {
if (bufLen <= 13) {
code = buf << (13 - bufLen);
} else {
code = buf >> (bufLen - 13);
}
p = &blackTab1[code & 0x7f];
} else if (bufLen >= 7 && ((buf >> (bufLen - 4)) & 0x0f) == 0 &&
((buf >> (bufLen - 6)) & 0x03) != 0) {
if (bufLen <= 12) {
code = buf << (12 - bufLen);
} else {
code = buf >> (bufLen - 12);
}
p = &blackTab2[(code & 0xff) - 64];
} else {
if (bufLen <= 6) {
code = buf << (6 - bufLen);
} else {
code = buf >> (bufLen - 6);
}
p = &blackTab3[code & 0x3f];
}
if (p->bits > 0 && p->bits <= (int)bufLen) {
bufLen -= p->bits;
return p->n;
}
if (bufLen >= 13) {
break;
}
buf = (buf << 8) | (str->getChar() & 0xff);
bufLen += 8;
++nBytesRead;
}
error(str->getPos(), "Bad black code in JBIG2 MMR stream");
--bufLen;
return 1;
}
| 247,690,782,923,801,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,754 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int JBIG2Stream::getChar() {
if (dataPtr && dataPtr < dataEnd) {
return (*dataPtr++ ^ 0xff) & 0xff;
}
return EOF;
}
| 253,516,824,912,237,900,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,755 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | Guchar *getDataPtr() { return data; }
| 211,447,506,254,611,230,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,756 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int getDataSize() { return h * line; }
| 31,963,386,164,957,487,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,757 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JArithmeticDecoderStats *getGenericRegionStats()
{ return genericRegionStats; }
| 264,215,465,173,497,900,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,758 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int getHeight() { return h; }
| 208,572,797,998,249,740,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,759 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2HuffmanTable *getHuffTable() { return table; }
| 259,002,374,671,954,830,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,760 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int getPixel(int x, int y)
{ return (x < 0 || x >= w || y < 0 || y >= h) ? 0 :
(data[y * line + (x >> 3)] >> (7 - (x & 7))) & 1; }
| 153,314,984,519,913,360,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,761 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JArithmeticDecoderStats *getRefinementRegionStats()
{ return refinementRegionStats; }
| 291,299,583,318,161,250,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,762 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | Guint getSegNum() { return segNum; }
| 117,144,531,650,102,640,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,763 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | Guint getSize() { return size; }
| 239,252,592,220,251,760,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,764 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | virtual JBIG2SegmentType getType() { return jbig2SegBitmap; }
| 274,304,314,750,792,400,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,765 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | virtual JBIG2SegmentType getType() { return jbig2SegSymbolDict; }
| 140,365,789,837,889,370,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,766 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | virtual JBIG2SegmentType getType() { return jbig2SegPatternDict; }
| 43,616,451,098,207,430,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,767 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | virtual JBIG2SegmentType getType() { return jbig2SegCodeTable; }
| 203,382,132,353,830,660,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,768 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int JBIG2MMRDecoder::getWhiteCode() {
const CCITTCode *p;
Guint code;
if (bufLen == 0) {
buf = str->getChar() & 0xff;
bufLen = 8;
++nBytesRead;
}
while (1) {
if (bufLen >= 11 && ((buf >> (bufLen - 7)) & 0x7f) == 0) {
if (bufLen <= 12) {
code = buf << (12 - bufLen);
} else {
code = buf >> (bufLen - 12);
}
p = &whiteTab1[code & 0x1f];
} else {
if (bufLen <= 9) {
code = buf << (9 - bufLen);
} else {
code = buf >> (bufLen - 9);
}
p = &whiteTab2[code & 0x1ff];
}
if (p->bits > 0 && p->bits <= (int)bufLen) {
bufLen -= p->bits;
return p->n;
}
if (bufLen >= 12) {
break;
}
buf = (buf << 8) | (str->getChar() & 0xff);
bufLen += 8;
++nBytesRead;
}
error(str->getPos(), "Bad white code in JBIG2 MMR stream");
--bufLen;
return 1;
}
| 247,789,652,247,557,680,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,769 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int getWidth() { return w; }
| 307,430,181,913,261,540,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,770 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool JBIG2Stream::isBinary(GBool last) {
return str->isBinary(gTrue);
}
| 73,644,504,608,404,330,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,771 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool isOk() { return data != NULL; }
| 108,658,966,581,385,300,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,772 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | int JBIG2Stream::lookChar() {
if (dataPtr && dataPtr < dataEnd) {
return (*dataPtr ^ 0xff) & 0xff;
}
return EOF;
}
| 124,620,299,537,141,330,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,773 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | inline int JBIG2Bitmap::nextPixel(JBIG2BitmapPtr *ptr) {
int pix;
if (!ptr->p) {
pix = 0;
} else if (ptr->x < 0) {
++ptr->x;
pix = 0;
} else {
pix = (*ptr->p >> ptr->shift) & 1;
if (++ptr->x == w) {
ptr->p = NULL;
} else if (ptr->shift == 0) {
++ptr->p;
ptr->shift = 7;
} else {
--ptr->shift;
}
}
return pix;
}
| 176,147,853,223,508,070,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,774 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | Guint JBIG2HuffmanDecoder::readBit() {
if (bufLen == 0) {
buf = str->getChar();
bufLen = 8;
}
--bufLen;
return (buf >> bufLen) & 1;
}
| 219,579,880,304,110,920,000,000,000,000,000,000,000 | JBIG2Stream.cc | 95,263,130,165,631,790,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,775 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool JBIG2Stream::readByte(int *x) {
int c0;
if ((c0 = curStr->getChar()) == EOF) {
return gFalse;
}
*x = c0;
if (c0 & 0x80) {
*x |= -1 - 0xff;
}
return gTrue;
}
| 32,463,812,698,252,020,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,776 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readCodeTableSeg(Guint segNum, Guint length) {
JBIG2HuffmanTable *huffTab;
Guint flags, oob, prefixBits, rangeBits;
int lowVal, highVal, val;
Guint huffTabSize, i;
if (!readUByte(&flags) || !readLong(&lowVal) || !readLong(&highVal)) {
goto eofError;
}
oob = flags & 1;
prefixBits = ((flags >> 1) & 7) + 1;
rangeBits = ((flags >> 4) & 7) + 1;
huffDecoder->reset();
huffTabSize = 8;
huffTab = (JBIG2HuffmanTable *)
gmallocn(huffTabSize, sizeof(JBIG2HuffmanTable));
i = 0;
val = lowVal;
while (val < highVal) {
if (i == huffTabSize) {
huffTabSize *= 2;
huffTab = (JBIG2HuffmanTable *)
greallocn(huffTab, huffTabSize, sizeof(JBIG2HuffmanTable));
}
huffTab[i].val = val;
huffTab[i].prefixLen = huffDecoder->readBits(prefixBits);
huffTab[i].rangeLen = huffDecoder->readBits(rangeBits);
val += 1 << huffTab[i].rangeLen;
++i;
}
if (i + oob + 3 > huffTabSize) {
huffTabSize = i + oob + 3;
huffTab = (JBIG2HuffmanTable *)
greallocn(huffTab, huffTabSize, sizeof(JBIG2HuffmanTable));
}
huffTab[i].val = lowVal - 1;
huffTab[i].prefixLen = huffDecoder->readBits(prefixBits);
huffTab[i].rangeLen = jbig2HuffmanLOW;
++i;
huffTab[i].val = highVal;
huffTab[i].prefixLen = huffDecoder->readBits(prefixBits);
huffTab[i].rangeLen = 32;
++i;
if (oob) {
huffTab[i].val = 0;
huffTab[i].prefixLen = huffDecoder->readBits(prefixBits);
huffTab[i].rangeLen = jbig2HuffmanOOB;
++i;
}
huffTab[i].val = 0;
huffTab[i].prefixLen = 0;
huffTab[i].rangeLen = jbig2HuffmanEOT;
huffDecoder->buildTable(huffTab, i);
segments->append(new JBIG2CodeTable(segNum, huffTab));
return;
eofError:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 143,615,039,114,018,490,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,777 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readEndOfStripeSeg(Guint length) {
Guint i;
for (i = 0; i < length; ++i) {
curStr->getChar();
}
}
| 64,500,051,435,459,410,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,778 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readExtensionSeg(Guint length) {
Guint i;
for (i = 0; i < length; ++i) {
curStr->getChar();
}
}
| 290,497,113,514,489,850,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,779 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Bitmap *JBIG2Stream::readGenericBitmap(GBool mmr, int w, int h,
int templ, GBool tpgdOn,
GBool useSkip, JBIG2Bitmap *skip,
int *atx, int *aty,
int mmrDataLength) {
JBIG2Bitmap *bitmap;
GBool ltp;
Guint ltpCX, cx, cx0, cx1, cx2;
JBIG2BitmapPtr cxPtr0 = {0}, cxPtr1 = {0};
JBIG2BitmapPtr atPtr0 = {0}, atPtr1 = {0}, atPtr2 = {0}, atPtr3 = {0};
int *refLine, *codingLine;
int code1, code2, code3;
int x, y, a0, pix, i, refI, codingI;
bitmap = new JBIG2Bitmap(0, w, h);
bitmap->clearToZero();
if (mmr) {
mmrDecoder->reset();
refLine = (int *)gmallocn(w + 2, sizeof(int));
codingLine = (int *)gmallocn(w + 2, sizeof(int));
codingLine[0] = codingLine[1] = w;
for (y = 0; y < h; ++y) {
for (i = 0; codingLine[i] < w; ++i) {
refLine[i] = codingLine[i];
}
refLine[i] = refLine[i + 1] = w;
refI = 0; // b1 = refLine[refI]
codingI = 0; // a1 = codingLine[codingI]
a0 = 0;
do {
code1 = mmrDecoder->get2DCode();
switch (code1) {
case twoDimPass:
if (refLine[refI] < w) {
a0 = refLine[refI + 1];
refI += 2;
}
break;
case twoDimHoriz:
if (codingI & 1) {
code1 = 0;
do {
code1 += code3 = mmrDecoder->getBlackCode();
} while (code3 >= 64);
code2 = 0;
do {
code2 += code3 = mmrDecoder->getWhiteCode();
} while (code3 >= 64);
} else {
code1 = 0;
do {
code1 += code3 = mmrDecoder->getWhiteCode();
} while (code3 >= 64);
code2 = 0;
do {
code2 += code3 = mmrDecoder->getBlackCode();
} while (code3 >= 64);
}
if (code1 > 0 || code2 > 0) {
a0 = codingLine[codingI++] = a0 + code1;
a0 = codingLine[codingI++] = a0 + code2;
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
}
break;
case twoDimVert0:
a0 = codingLine[codingI++] = refLine[refI];
if (refLine[refI] < w) {
++refI;
}
break;
case twoDimVertR1:
a0 = codingLine[codingI++] = refLine[refI] + 1;
if (refLine[refI] < w) {
++refI;
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
}
break;
case twoDimVertR2:
a0 = codingLine[codingI++] = refLine[refI] + 2;
if (refLine[refI] < w) {
++refI;
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
}
break;
case twoDimVertR3:
a0 = codingLine[codingI++] = refLine[refI] + 3;
if (refLine[refI] < w) {
++refI;
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
}
break;
case twoDimVertL1:
a0 = codingLine[codingI++] = refLine[refI] - 1;
if (refI > 0) {
--refI;
} else {
++refI;
}
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
break;
case twoDimVertL2:
a0 = codingLine[codingI++] = refLine[refI] - 2;
if (refI > 0) {
--refI;
} else {
++refI;
}
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
break;
case twoDimVertL3:
a0 = codingLine[codingI++] = refLine[refI] - 3;
if (refI > 0) {
--refI;
} else {
++refI;
}
while (refLine[refI] <= a0 && refLine[refI] < w) {
refI += 2;
}
break;
default:
error(getPos(), "Illegal code in JBIG2 MMR bitmap data");
break;
}
} while (a0 < w);
codingLine[codingI++] = w;
i = 0;
while (codingLine[i] < w) {
for (x = codingLine[i]; x < codingLine[i+1]; ++x) {
bitmap->setPixel(x, y);
}
i += 2;
}
}
if (mmrDataLength >= 0) {
mmrDecoder->skipTo(mmrDataLength);
} else {
if (mmrDecoder->get24Bits() != 0x001001) {
error(getPos(), "Missing EOFB in JBIG2 MMR bitmap data");
}
}
gfree(refLine);
gfree(codingLine);
} else {
ltpCX = 0; // make gcc happy
if (tpgdOn) {
switch (templ) {
case 0:
ltpCX = 0x3953; // 001 11001 0101 0011
break;
case 1:
ltpCX = 0x079a; // 0011 11001 101 0
break;
case 2:
ltpCX = 0x0e3; // 001 1100 01 1
break;
case 3:
ltpCX = 0x18a; // 01100 0101 1
break;
}
}
ltp = 0;
cx = cx0 = cx1 = cx2 = 0; // make gcc happy
for (y = 0; y < h; ++y) {
if (tpgdOn) {
if (arithDecoder->decodeBit(ltpCX, genericRegionStats)) {
ltp = !ltp;
}
if (ltp) {
bitmap->duplicateRow(y, y-1);
continue;
}
}
switch (templ) {
case 0:
bitmap->getPixelPtr(0, y-2, &cxPtr0);
cx0 = bitmap->nextPixel(&cxPtr0);
cx0 = (cx0 << 1) | bitmap->nextPixel(&cxPtr0);
bitmap->getPixelPtr(0, y-1, &cxPtr1);
cx1 = bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx2 = 0;
bitmap->getPixelPtr(atx[0], y + aty[0], &atPtr0);
bitmap->getPixelPtr(atx[1], y + aty[1], &atPtr1);
bitmap->getPixelPtr(atx[2], y + aty[2], &atPtr2);
bitmap->getPixelPtr(atx[3], y + aty[3], &atPtr3);
for (x = 0; x < w; ++x) {
cx = (cx0 << 13) | (cx1 << 8) | (cx2 << 4) |
(bitmap->nextPixel(&atPtr0) << 3) |
(bitmap->nextPixel(&atPtr1) << 2) |
(bitmap->nextPixel(&atPtr2) << 1) |
bitmap->nextPixel(&atPtr3);
if (useSkip && skip->getPixel(x, y)) {
pix = 0;
} else if ((pix = arithDecoder->decodeBit(cx, genericRegionStats))) {
bitmap->setPixel(x, y);
}
cx0 = ((cx0 << 1) | bitmap->nextPixel(&cxPtr0)) & 0x07;
cx1 = ((cx1 << 1) | bitmap->nextPixel(&cxPtr1)) & 0x1f;
cx2 = ((cx2 << 1) | pix) & 0x0f;
}
break;
case 1:
bitmap->getPixelPtr(0, y-2, &cxPtr0);
cx0 = bitmap->nextPixel(&cxPtr0);
cx0 = (cx0 << 1) | bitmap->nextPixel(&cxPtr0);
cx0 = (cx0 << 1) | bitmap->nextPixel(&cxPtr0);
bitmap->getPixelPtr(0, y-1, &cxPtr1);
cx1 = bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx2 = 0;
bitmap->getPixelPtr(atx[0], y + aty[0], &atPtr0);
for (x = 0; x < w; ++x) {
cx = (cx0 << 9) | (cx1 << 4) | (cx2 << 1) |
bitmap->nextPixel(&atPtr0);
if (useSkip && skip->getPixel(x, y)) {
pix = 0;
} else if ((pix = arithDecoder->decodeBit(cx, genericRegionStats))) {
bitmap->setPixel(x, y);
}
cx0 = ((cx0 << 1) | bitmap->nextPixel(&cxPtr0)) & 0x0f;
cx1 = ((cx1 << 1) | bitmap->nextPixel(&cxPtr1)) & 0x1f;
cx2 = ((cx2 << 1) | pix) & 0x07;
}
break;
case 2:
bitmap->getPixelPtr(0, y-2, &cxPtr0);
cx0 = bitmap->nextPixel(&cxPtr0);
cx0 = (cx0 << 1) | bitmap->nextPixel(&cxPtr0);
bitmap->getPixelPtr(0, y-1, &cxPtr1);
cx1 = bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx2 = 0;
bitmap->getPixelPtr(atx[0], y + aty[0], &atPtr0);
for (x = 0; x < w; ++x) {
cx = (cx0 << 7) | (cx1 << 3) | (cx2 << 1) |
bitmap->nextPixel(&atPtr0);
if (useSkip && skip->getPixel(x, y)) {
pix = 0;
} else if ((pix = arithDecoder->decodeBit(cx, genericRegionStats))) {
bitmap->setPixel(x, y);
}
cx0 = ((cx0 << 1) | bitmap->nextPixel(&cxPtr0)) & 0x07;
cx1 = ((cx1 << 1) | bitmap->nextPixel(&cxPtr1)) & 0x0f;
cx2 = ((cx2 << 1) | pix) & 0x03;
}
break;
case 3:
bitmap->getPixelPtr(0, y-1, &cxPtr1);
cx1 = bitmap->nextPixel(&cxPtr1);
cx1 = (cx1 << 1) | bitmap->nextPixel(&cxPtr1);
cx2 = 0;
bitmap->getPixelPtr(atx[0], y + aty[0], &atPtr0);
for (x = 0; x < w; ++x) {
cx = (cx1 << 5) | (cx2 << 1) |
bitmap->nextPixel(&atPtr0);
if (useSkip && skip->getPixel(x, y)) {
pix = 0;
} else if ((pix = arithDecoder->decodeBit(cx, genericRegionStats))) {
bitmap->setPixel(x, y);
}
cx1 = ((cx1 << 1) | bitmap->nextPixel(&cxPtr1)) & 0x1f;
cx2 = ((cx2 << 1) | pix) & 0x0f;
}
break;
}
}
}
return bitmap;
}
| 105,622,674,989,151,040,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,780 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | JBIG2Bitmap *JBIG2Stream::readGenericRefinementRegion(int w, int h,
int templ, GBool tpgrOn,
JBIG2Bitmap *refBitmap,
int refDX, int refDY,
int *atx, int *aty) {
JBIG2Bitmap *bitmap;
GBool ltp;
Guint ltpCX, cx, cx0, cx2, cx3, cx4, tpgrCX0, tpgrCX1, tpgrCX2;
JBIG2BitmapPtr cxPtr0 = {0};
JBIG2BitmapPtr cxPtr1 = {0};
JBIG2BitmapPtr cxPtr2 = {0};
JBIG2BitmapPtr cxPtr3 = {0};
JBIG2BitmapPtr cxPtr4 = {0};
JBIG2BitmapPtr cxPtr5 = {0};
JBIG2BitmapPtr cxPtr6 = {0};
JBIG2BitmapPtr tpgrCXPtr0 = {0};
JBIG2BitmapPtr tpgrCXPtr1 = {0};
JBIG2BitmapPtr tpgrCXPtr2 = {0};
int x, y, pix;
bitmap = new JBIG2Bitmap(0, w, h);
if (!bitmap->isOk())
{
delete bitmap;
return NULL;
}
bitmap->clearToZero();
if (templ) {
ltpCX = 0x008;
} else {
ltpCX = 0x0010;
}
ltp = 0;
for (y = 0; y < h; ++y) {
if (templ) {
bitmap->getPixelPtr(0, y-1, &cxPtr0);
cx0 = bitmap->nextPixel(&cxPtr0);
bitmap->getPixelPtr(-1, y, &cxPtr1);
refBitmap->getPixelPtr(-refDX, y-1-refDY, &cxPtr2);
refBitmap->getPixelPtr(-1-refDX, y-refDY, &cxPtr3);
cx3 = refBitmap->nextPixel(&cxPtr3);
cx3 = (cx3 << 1) | refBitmap->nextPixel(&cxPtr3);
refBitmap->getPixelPtr(-refDX, y+1-refDY, &cxPtr4);
cx4 = refBitmap->nextPixel(&cxPtr4);
tpgrCX0 = tpgrCX1 = tpgrCX2 = 0; // make gcc happy
if (tpgrOn) {
refBitmap->getPixelPtr(-1-refDX, y-1-refDY, &tpgrCXPtr0);
tpgrCX0 = refBitmap->nextPixel(&tpgrCXPtr0);
tpgrCX0 = (tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0);
tpgrCX0 = (tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0);
refBitmap->getPixelPtr(-1-refDX, y-refDY, &tpgrCXPtr1);
tpgrCX1 = refBitmap->nextPixel(&tpgrCXPtr1);
tpgrCX1 = (tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1);
tpgrCX1 = (tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1);
refBitmap->getPixelPtr(-1-refDX, y+1-refDY, &tpgrCXPtr2);
tpgrCX2 = refBitmap->nextPixel(&tpgrCXPtr2);
tpgrCX2 = (tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2);
tpgrCX2 = (tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2);
}
for (x = 0; x < w; ++x) {
cx0 = ((cx0 << 1) | bitmap->nextPixel(&cxPtr0)) & 7;
cx3 = ((cx3 << 1) | refBitmap->nextPixel(&cxPtr3)) & 7;
cx4 = ((cx4 << 1) | refBitmap->nextPixel(&cxPtr4)) & 3;
if (tpgrOn) {
tpgrCX0 = ((tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0)) & 7;
tpgrCX1 = ((tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1)) & 7;
tpgrCX2 = ((tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2)) & 7;
if (arithDecoder->decodeBit(ltpCX, refinementRegionStats)) {
ltp = !ltp;
}
if (tpgrCX0 == 0 && tpgrCX1 == 0 && tpgrCX2 == 0) {
bitmap->clearPixel(x, y);
continue;
} else if (tpgrCX0 == 7 && tpgrCX1 == 7 && tpgrCX2 == 7) {
bitmap->setPixel(x, y);
continue;
}
}
cx = (cx0 << 7) | (bitmap->nextPixel(&cxPtr1) << 6) |
(refBitmap->nextPixel(&cxPtr2) << 5) |
(cx3 << 2) | cx4;
if ((pix = arithDecoder->decodeBit(cx, refinementRegionStats))) {
bitmap->setPixel(x, y);
}
}
} else {
bitmap->getPixelPtr(0, y-1, &cxPtr0);
cx0 = bitmap->nextPixel(&cxPtr0);
bitmap->getPixelPtr(-1, y, &cxPtr1);
refBitmap->getPixelPtr(-refDX, y-1-refDY, &cxPtr2);
cx2 = refBitmap->nextPixel(&cxPtr2);
refBitmap->getPixelPtr(-1-refDX, y-refDY, &cxPtr3);
cx3 = refBitmap->nextPixel(&cxPtr3);
cx3 = (cx3 << 1) | refBitmap->nextPixel(&cxPtr3);
refBitmap->getPixelPtr(-1-refDX, y+1-refDY, &cxPtr4);
cx4 = refBitmap->nextPixel(&cxPtr4);
cx4 = (cx4 << 1) | refBitmap->nextPixel(&cxPtr4);
bitmap->getPixelPtr(atx[0], y+aty[0], &cxPtr5);
refBitmap->getPixelPtr(atx[1]-refDX, y+aty[1]-refDY, &cxPtr6);
tpgrCX0 = tpgrCX1 = tpgrCX2 = 0; // make gcc happy
if (tpgrOn) {
refBitmap->getPixelPtr(-1-refDX, y-1-refDY, &tpgrCXPtr0);
tpgrCX0 = refBitmap->nextPixel(&tpgrCXPtr0);
tpgrCX0 = (tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0);
tpgrCX0 = (tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0);
refBitmap->getPixelPtr(-1-refDX, y-refDY, &tpgrCXPtr1);
tpgrCX1 = refBitmap->nextPixel(&tpgrCXPtr1);
tpgrCX1 = (tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1);
tpgrCX1 = (tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1);
refBitmap->getPixelPtr(-1-refDX, y+1-refDY, &tpgrCXPtr2);
tpgrCX2 = refBitmap->nextPixel(&tpgrCXPtr2);
tpgrCX2 = (tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2);
tpgrCX2 = (tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2);
}
for (x = 0; x < w; ++x) {
cx0 = ((cx0 << 1) | bitmap->nextPixel(&cxPtr0)) & 3;
cx2 = ((cx2 << 1) | refBitmap->nextPixel(&cxPtr2)) & 3;
cx3 = ((cx3 << 1) | refBitmap->nextPixel(&cxPtr3)) & 7;
cx4 = ((cx4 << 1) | refBitmap->nextPixel(&cxPtr4)) & 7;
if (tpgrOn) {
tpgrCX0 = ((tpgrCX0 << 1) | refBitmap->nextPixel(&tpgrCXPtr0)) & 7;
tpgrCX1 = ((tpgrCX1 << 1) | refBitmap->nextPixel(&tpgrCXPtr1)) & 7;
tpgrCX2 = ((tpgrCX2 << 1) | refBitmap->nextPixel(&tpgrCXPtr2)) & 7;
if (arithDecoder->decodeBit(ltpCX, refinementRegionStats)) {
ltp = !ltp;
}
if (tpgrCX0 == 0 && tpgrCX1 == 0 && tpgrCX2 == 0) {
bitmap->clearPixel(x, y);
continue;
} else if (tpgrCX0 == 7 && tpgrCX1 == 7 && tpgrCX2 == 7) {
bitmap->setPixel(x, y);
continue;
}
}
cx = (cx0 << 11) | (bitmap->nextPixel(&cxPtr1) << 10) |
(cx2 << 8) | (cx3 << 5) | (cx4 << 2) |
(bitmap->nextPixel(&cxPtr5) << 1) |
refBitmap->nextPixel(&cxPtr6);
if ((pix = arithDecoder->decodeBit(cx, refinementRegionStats))) {
bitmap->setPixel(x, y);
}
}
}
}
return bitmap;
}
| 202,740,766,697,753,900,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,781 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readGenericRefinementRegionSeg(Guint segNum, GBool imm,
GBool lossless, Guint length,
Guint *refSegs,
Guint nRefSegs) {
JBIG2Bitmap *bitmap, *refBitmap;
Guint w, h, x, y, segInfoFlags, extCombOp;
Guint flags, templ, tpgrOn;
int atx[2], aty[2];
JBIG2Segment *seg;
if (!readULong(&w) || !readULong(&h) ||
!readULong(&x) || !readULong(&y) ||
!readUByte(&segInfoFlags)) {
goto eofError;
}
extCombOp = segInfoFlags & 7;
if (!readUByte(&flags)) {
goto eofError;
}
templ = flags & 1;
tpgrOn = (flags >> 1) & 1;
if (!templ) {
if (!readByte(&atx[0]) || !readByte(&aty[0]) ||
!readByte(&atx[1]) || !readByte(&aty[1])) {
goto eofError;
}
}
if (nRefSegs == 0 || imm) {
if (pageH == 0xffffffff && y + h > curPageH) {
pageBitmap->expand(y + h, pageDefPixel);
}
}
if (nRefSegs > 1) {
error(getPos(), "Bad reference in JBIG2 generic refinement segment");
return;
}
if (nRefSegs == 1) {
seg = findSegment(refSegs[0]);
if (seg == NULL || seg->getType() != jbig2SegBitmap) {
error(getPos(), "Bad bitmap reference in JBIG2 generic refinement segment");
return;
}
refBitmap = (JBIG2Bitmap *)seg;
} else {
refBitmap = pageBitmap->getSlice(x, y, w, h);
}
resetRefinementStats(templ, NULL);
arithDecoder->start();
bitmap = readGenericRefinementRegion(w, h, templ, tpgrOn,
refBitmap, 0, 0, atx, aty);
if (imm) {
pageBitmap->combine(bitmap, x, y, extCombOp);
delete bitmap;
} else {
bitmap->setSegNum(segNum);
segments->append(bitmap);
}
if (nRefSegs == 1) {
discardSegment(refSegs[0]);
} else {
delete refBitmap;
}
return;
eofError:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 54,830,886,247,591,990,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,782 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readGenericRegionSeg(Guint segNum, GBool imm,
GBool lossless, Guint length) {
JBIG2Bitmap *bitmap;
Guint w, h, x, y, segInfoFlags, extCombOp;
Guint flags, mmr, templ, tpgdOn;
int atx[4], aty[4];
if (!readULong(&w) || !readULong(&h) ||
!readULong(&x) || !readULong(&y) ||
!readUByte(&segInfoFlags)) {
goto eofError;
}
extCombOp = segInfoFlags & 7;
if (!readUByte(&flags)) {
goto eofError;
}
mmr = flags & 1;
templ = (flags >> 1) & 3;
tpgdOn = (flags >> 3) & 1;
if (!mmr) {
if (templ == 0) {
if (!readByte(&atx[0]) ||
!readByte(&aty[0]) ||
!readByte(&atx[1]) ||
!readByte(&aty[1]) ||
!readByte(&atx[2]) ||
!readByte(&aty[2]) ||
!readByte(&atx[3]) ||
!readByte(&aty[3])) {
goto eofError;
}
} else {
if (!readByte(&atx[0]) ||
!readByte(&aty[0])) {
goto eofError;
}
}
}
if (!mmr) {
resetGenericStats(templ, NULL);
arithDecoder->start();
}
bitmap = readGenericBitmap(mmr, w, h, templ, tpgdOn, gFalse,
NULL, atx, aty, mmr ? 0 : length - 18);
if (imm) {
if (pageH == 0xffffffff && y + h > curPageH) {
pageBitmap->expand(y + h, pageDefPixel);
}
pageBitmap->combine(bitmap, x, y, extCombOp);
delete bitmap;
} else {
bitmap->setSegNum(segNum);
segments->append(bitmap);
}
return;
eofError:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 217,547,477,369,688,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,783 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readHalftoneRegionSeg(Guint segNum, GBool imm,
GBool lossless, Guint length,
Guint *refSegs, Guint nRefSegs) {
JBIG2Bitmap *bitmap;
JBIG2Segment *seg;
JBIG2PatternDict *patternDict;
JBIG2Bitmap *skipBitmap;
Guint *grayImg;
JBIG2Bitmap *grayBitmap;
JBIG2Bitmap *patternBitmap;
Guint w, h, x, y, segInfoFlags, extCombOp;
Guint flags, mmr, templ, enableSkip, combOp;
Guint gridW, gridH, stepX, stepY, patW, patH;
int atx[4], aty[4];
int gridX, gridY, xx, yy, bit, j;
Guint bpp, m, n, i;
if (!readULong(&w) || !readULong(&h) ||
!readULong(&x) || !readULong(&y) ||
!readUByte(&segInfoFlags)) {
goto eofError;
}
extCombOp = segInfoFlags & 7;
if (!readUByte(&flags)) {
goto eofError;
}
mmr = flags & 1;
templ = (flags >> 1) & 3;
enableSkip = (flags >> 3) & 1;
combOp = (flags >> 4) & 7;
if (!readULong(&gridW) || !readULong(&gridH) ||
!readLong(&gridX) || !readLong(&gridY) ||
!readUWord(&stepX) || !readUWord(&stepY)) {
goto eofError;
}
if (w == 0 || h == 0 || w >= INT_MAX / h) {
error(getPos(), "Bad bitmap size in JBIG2 halftone segment");
return;
}
if (gridH == 0 || gridW >= INT_MAX / gridH) {
error(getPos(), "Bad grid size in JBIG2 halftone segment");
return;
}
if (nRefSegs != 1) {
error(getPos(), "Bad symbol dictionary reference in JBIG2 halftone segment");
return;
}
seg = findSegment(refSegs[0]);
if (seg == NULL || seg->getType() != jbig2SegPatternDict) {
error(getPos(), "Bad symbol dictionary reference in JBIG2 halftone segment");
return;
}
patternDict = (JBIG2PatternDict *)seg;
bpp = 0;
i = 1;
while (i < patternDict->getSize()) {
++bpp;
i <<= 1;
}
patW = patternDict->getBitmap(0)->getWidth();
patH = patternDict->getBitmap(0)->getHeight();
if (!mmr) {
resetGenericStats(templ, NULL);
arithDecoder->start();
}
bitmap = new JBIG2Bitmap(segNum, w, h);
if (flags & 0x80) { // HDEFPIXEL
bitmap->clearToOne();
} else {
bitmap->clearToZero();
}
skipBitmap = NULL;
if (enableSkip) {
skipBitmap = new JBIG2Bitmap(0, gridW, gridH);
skipBitmap->clearToZero();
for (m = 0; m < gridH; ++m) {
for (n = 0; n < gridW; ++n) {
xx = gridX + m * stepY + n * stepX;
yy = gridY + m * stepX - n * stepY;
if (((xx + (int)patW) >> 8) <= 0 || (xx >> 8) >= (int)w ||
((yy + (int)patH) >> 8) <= 0 || (yy >> 8) >= (int)h) {
skipBitmap->setPixel(n, m);
}
}
}
}
grayImg = (Guint *)gmallocn(gridW * gridH, sizeof(Guint));
memset(grayImg, 0, gridW * gridH * sizeof(Guint));
atx[0] = templ <= 1 ? 3 : 2; aty[0] = -1;
atx[1] = -3; aty[1] = -1;
atx[2] = 2; aty[2] = -2;
atx[3] = -2; aty[3] = -2;
for (j = bpp - 1; j >= 0; --j) {
grayBitmap = readGenericBitmap(mmr, gridW, gridH, templ, gFalse,
enableSkip, skipBitmap, atx, aty, -1);
i = 0;
for (m = 0; m < gridH; ++m) {
for (n = 0; n < gridW; ++n) {
bit = grayBitmap->getPixel(n, m) ^ (grayImg[i] & 1);
grayImg[i] = (grayImg[i] << 1) | bit;
++i;
}
}
delete grayBitmap;
}
i = 0;
for (m = 0; m < gridH; ++m) {
xx = gridX + m * stepY;
yy = gridY + m * stepX;
for (n = 0; n < gridW; ++n) {
if (!(enableSkip && skipBitmap->getPixel(n, m))) {
patternBitmap = patternDict->getBitmap(grayImg[i]);
bitmap->combine(patternBitmap, xx >> 8, yy >> 8, combOp);
}
xx += stepX;
yy -= stepY;
++i;
}
}
gfree(grayImg);
if (skipBitmap) {
delete skipBitmap;
}
if (imm) {
if (pageH == 0xffffffff && y + h > curPageH) {
pageBitmap->expand(y + h, pageDefPixel);
}
pageBitmap->combine(bitmap, x, y, extCombOp);
delete bitmap;
} else {
segments->append(bitmap);
}
return;
eofError:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 321,320,648,015,474,850,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,784 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool JBIG2Stream::readLong(int *x) {
int c0, c1, c2, c3;
if ((c0 = curStr->getChar()) == EOF ||
(c1 = curStr->getChar()) == EOF ||
(c2 = curStr->getChar()) == EOF ||
(c3 = curStr->getChar()) == EOF) {
return gFalse;
}
*x = ((c0 << 24) | (c1 << 16) | (c2 << 8) | c3);
if (c0 & 0x80) {
*x |= -1 - (int)0xffffffff;
}
return gTrue;
}
| 43,353,721,469,095,980,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,785 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readPageInfoSeg(Guint length) {
Guint xRes, yRes, flags, striping;
if (!readULong(&pageW) || !readULong(&pageH) ||
!readULong(&xRes) || !readULong(&yRes) ||
!readUByte(&flags) || !readUWord(&striping)) {
goto eofError;
}
pageDefPixel = (flags >> 2) & 1;
defCombOp = (flags >> 3) & 3;
if (pageH == 0xffffffff) {
curPageH = striping & 0x7fff;
} else {
curPageH = pageH;
}
pageBitmap = new JBIG2Bitmap(0, pageW, curPageH);
if (pageDefPixel) {
pageBitmap->clearToOne();
} else {
pageBitmap->clearToZero();
}
return;
eofError:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 322,099,217,618,344,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,786 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readProfilesSeg(Guint length) {
Guint i;
for (i = 0; i < length; ++i) {
curStr->getChar();
}
}
| 305,818,984,962,005,320,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,787 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void JBIG2Stream::readSegments() {
Guint segNum, segFlags, segType, page, segLength;
Guint refFlags, nRefSegs;
Guint *refSegs;
int segDataPos;
int c1, c2, c3;
Guint i;
while (readULong(&segNum)) {
if (!readUByte(&segFlags)) {
goto eofError1;
}
segType = segFlags & 0x3f;
if (!readUByte(&refFlags)) {
goto eofError1;
}
nRefSegs = refFlags >> 5;
if (nRefSegs == 7) {
if ((c1 = curStr->getChar()) == EOF ||
(c2 = curStr->getChar()) == EOF ||
(c3 = curStr->getChar()) == EOF) {
goto eofError1;
}
refFlags = (refFlags << 24) | (c1 << 16) | (c2 << 8) | c3;
nRefSegs = refFlags & 0x1fffffff;
for (i = 0; i < (nRefSegs + 9) >> 3; ++i) {
c1 = curStr->getChar();
}
}
refSegs = (Guint *)gmallocn(nRefSegs, sizeof(Guint));
if (segNum <= 256) {
for (i = 0; i < nRefSegs; ++i) {
if (!readUByte(&refSegs[i])) {
goto eofError2;
}
}
} else if (segNum <= 65536) {
for (i = 0; i < nRefSegs; ++i) {
if (!readUWord(&refSegs[i])) {
goto eofError2;
}
}
} else {
for (i = 0; i < nRefSegs; ++i) {
if (!readULong(&refSegs[i])) {
goto eofError2;
}
}
}
if (segFlags & 0x40) {
if (!readULong(&page)) {
goto eofError2;
}
} else {
if (!readUByte(&page)) {
goto eofError2;
}
}
if (!readULong(&segLength)) {
goto eofError2;
}
segDataPos = getPos();
switch (segType) {
case 0:
if (!readSymbolDictSeg(segNum, segLength, refSegs, nRefSegs)) {
goto syntaxError;
}
break;
case 4:
readTextRegionSeg(segNum, gFalse, gFalse, segLength, refSegs, nRefSegs);
break;
case 6:
readTextRegionSeg(segNum, gTrue, gFalse, segLength, refSegs, nRefSegs);
break;
case 7:
readTextRegionSeg(segNum, gTrue, gTrue, segLength, refSegs, nRefSegs);
break;
case 16:
readPatternDictSeg(segNum, segLength);
break;
case 20:
readHalftoneRegionSeg(segNum, gFalse, gFalse, segLength,
refSegs, nRefSegs);
break;
case 22:
readHalftoneRegionSeg(segNum, gTrue, gFalse, segLength,
refSegs, nRefSegs);
break;
case 23:
readHalftoneRegionSeg(segNum, gTrue, gTrue, segLength,
refSegs, nRefSegs);
break;
case 36:
readGenericRegionSeg(segNum, gFalse, gFalse, segLength);
break;
case 38:
readGenericRegionSeg(segNum, gTrue, gFalse, segLength);
break;
case 39:
readGenericRegionSeg(segNum, gTrue, gTrue, segLength);
break;
case 40:
readGenericRefinementRegionSeg(segNum, gFalse, gFalse, segLength,
refSegs, nRefSegs);
break;
case 42:
readGenericRefinementRegionSeg(segNum, gTrue, gFalse, segLength,
refSegs, nRefSegs);
break;
case 43:
readGenericRefinementRegionSeg(segNum, gTrue, gTrue, segLength,
refSegs, nRefSegs);
break;
case 48:
readPageInfoSeg(segLength);
break;
case 50:
readEndOfStripeSeg(segLength);
break;
case 52:
readProfilesSeg(segLength);
break;
case 53:
readCodeTableSeg(segNum, segLength);
break;
case 62:
readExtensionSeg(segLength);
break;
default:
error(getPos(), "Unknown segment type in JBIG2 stream");
for (i = 0; i < segLength; ++i) {
if ((c1 = curStr->getChar()) == EOF) {
goto eofError2;
}
}
break;
}
if (segLength != 0xffffffff) {
int segExtraBytes = segDataPos + segLength - getPos();
if (segExtraBytes > 0) {
error(getPos(), "%d extraneous byte%s after segment",
segExtraBytes, (segExtraBytes > 1) ? "s" : "");
int trash;
for (int i = segExtraBytes; i > 0; i--) {
readByte(&trash);
}
} else if (segExtraBytes < 0) {
error(getPos(), "Previous segment handler read too many bytes");
}
}
gfree(refSegs);
}
return;
syntaxError:
gfree(refSegs);
return;
eofError2:
gfree(refSegs);
eofError1:
error(getPos(), "Unexpected EOF in JBIG2 stream");
}
| 272,988,377,676,655,270,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,788 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | DeviceNRecoder::DeviceNRecoder(Stream *strA, int widthA, int heightA,
GfxImageColorMap *colorMapA):
FilterStream(strA) {
width = widthA;
height = heightA;
colorMap = colorMapA;
imgStr = NULL;
pixelIdx = 0;
bufIdx = gfxColorMaxComps;
bufSize = ((GfxDeviceNColorSpace *)colorMap->getColorSpace())->
getAlt()->getNComps();
func = ((GfxDeviceNColorSpace *)colorMap->getColorSpace())->
getTintTransformFunc();
}
| 48,287,491,240,465,640,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,789 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | PSOutCustomColor::PSOutCustomColor(double cA, double mA,
double yA, double kA, GooString *nameA) {
c = cA;
m = mA;
y = yA;
k = kA;
name = nameA;
next = NULL;
}
| 7,727,802,110,684,112,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,790 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | PSOutputDev::PSOutputDev(const char *fileName, XRef *xrefA, Catalog *catalog,
char *psTitle,
int firstPage, int lastPage, PSOutMode modeA,
int paperWidthA, int paperHeightA, GBool duplexA,
int imgLLXA, int imgLLYA, int imgURXA, int imgURYA,
GBool forceRasterizeA,
GBool manualCtrlA) {
FILE *f;
PSFileType fileTypeA;
underlayCbk = NULL;
underlayCbkData = NULL;
overlayCbk = NULL;
overlayCbkData = NULL;
fontIDs = NULL;
fontFileIDs = NULL;
fontFileNames = NULL;
font8Info = NULL;
font16Enc = NULL;
imgIDs = NULL;
formIDs = NULL;
xobjStack = NULL;
embFontList = NULL;
customColors = NULL;
haveTextClip = gFalse;
t3String = NULL;
forceRasterize = forceRasterizeA;
if (!strcmp(fileName, "-")) {
fileTypeA = psStdout;
f = stdout;
} else if (fileName[0] == '|') {
fileTypeA = psPipe;
#ifdef HAVE_POPEN
#ifndef WIN32
signal(SIGPIPE, (SignalFunc)SIG_IGN);
#endif
if (!(f = popen(fileName + 1, "w"))) {
error(-1, "Couldn't run print command '%s'", fileName);
ok = gFalse;
return;
}
#else
error(-1, "Print commands are not supported ('%s')", fileName);
ok = gFalse;
return;
#endif
} else {
fileTypeA = psFile;
if (!(f = fopen(fileName, "w"))) {
error(-1, "Couldn't open PostScript file '%s'", fileName);
ok = gFalse;
return;
}
}
init(outputToFile, f, fileTypeA, psTitle,
xrefA, catalog, firstPage, lastPage, modeA,
imgLLXA, imgLLYA, imgURXA, imgURYA, manualCtrlA,
paperWidthA, paperHeightA, duplexA);
}
| 300,594,182,672,505,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,791 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void PSOutputDev::addCustomColor(GfxSeparationColorSpace *sepCS) {
PSOutCustomColor *cc;
GfxColor color;
GfxCMYK cmyk;
for (cc = customColors; cc; cc = cc->next) {
if (!cc->name->cmp(sepCS->getName())) {
return;
}
}
color.c[0] = gfxColorComp1;
sepCS->getCMYK(&color, &cmyk);
cc = new PSOutCustomColor(colToDbl(cmyk.c), colToDbl(cmyk.m),
colToDbl(cmyk.y), colToDbl(cmyk.k),
sepCS->getName()->copy());
cc->next = customColors;
customColors = cc;
}
| 135,663,646,109,449,370,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,792 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void PSOutputDev::addProcessColor(double c, double m, double y, double k) {
if (c > 0) {
processColors |= psProcessCyan;
}
if (m > 0) {
processColors |= psProcessMagenta;
}
if (y > 0) {
processColors |= psProcessYellow;
}
if (k > 0) {
processColors |= psProcessBlack;
}
}
| 201,221,090,295,005,770,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,793 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | GBool PSOutputDev::axialShadedFill(GfxState *state, GfxAxialShading *shading) {
double xMin, yMin, xMax, yMax;
double x0, y0, x1, y1, dx, dy, mul;
double tMin, tMax, t, t0, t1;
int i;
if (level == psLevel2Sep || level == psLevel3Sep) {
if (shading->getColorSpace()->getMode() != csDeviceCMYK) {
return gFalse;
}
processColors |= psProcessCMYK;
}
state->getUserClipBBox(&xMin, &yMin, &xMax, &yMax);
shading->getCoords(&x0, &y0, &x1, &y1);
dx = x1 - x0;
dy = y1 - y0;
if (fabs(dx) < 0.01 && fabs(dy) < 0.01) {
return gTrue;
} else {
mul = 1 / (dx * dx + dy * dy);
tMin = tMax = ((xMin - x0) * dx + (yMin - y0) * dy) * mul;
t = ((xMin - x0) * dx + (yMax - y0) * dy) * mul;
if (t < tMin) {
tMin = t;
} else if (t > tMax) {
tMax = t;
}
t = ((xMax - x0) * dx + (yMin - y0) * dy) * mul;
if (t < tMin) {
tMin = t;
} else if (t > tMax) {
tMax = t;
}
t = ((xMax - x0) * dx + (yMax - y0) * dy) * mul;
if (t < tMin) {
tMin = t;
} else if (t > tMax) {
tMax = t;
}
if (tMin < 0 && !shading->getExtend0()) {
tMin = 0;
}
if (tMax > 1 && !shading->getExtend1()) {
tMax = 1;
}
}
t0 = shading->getDomain0();
t1 = shading->getDomain1();
writePSFmt("/t0 {0:.4g} def\n", t0);
writePSFmt("/t1 {0:.4g} def\n", t1);
writePSFmt("/dt {0:.4g} def\n", t1 - t0);
writePSFmt("/x0 {0:.4g} def\n", x0);
writePSFmt("/y0 {0:.4g} def\n", y0);
writePSFmt("/dx {0:.4g} def\n", x1 - x0);
writePSFmt("/x1 {0:.4g} def\n", x1);
writePSFmt("/y1 {0:.4g} def\n", y1);
writePSFmt("/dy {0:.4g} def\n", y1 - y0);
writePSFmt("/xMin {0:.4g} def\n", xMin);
writePSFmt("/yMin {0:.4g} def\n", yMin);
writePSFmt("/xMax {0:.4g} def\n", xMax);
writePSFmt("/yMax {0:.4g} def\n", yMax);
writePSFmt("/n {0:d} def\n", shading->getColorSpace()->getNComps());
if (shading->getNFuncs() == 1) {
writePS("/func ");
cvtFunction(shading->getFunc(0));
writePS("def\n");
} else {
writePS("/func {\n");
for (i = 0; i < shading->getNFuncs(); ++i) {
if (i < shading->getNFuncs() - 1) {
writePS("dup\n");
}
cvtFunction(shading->getFunc(i));
writePS("exec\n");
if (i < shading->getNFuncs() - 1) {
writePS("exch\n");
}
}
writePS("} def\n");
}
writePSFmt("{0:.4g} {1:.4g} 0 axialSH\n", tMin, tMax);
return gTrue;
}
| 60,889,568,329,579,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,794 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void PSOutputDev::clip(GfxState *state) {
doPath(state->getPath());
writePS("W\n");
}
| 128,087,645,368,471,900,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,795 | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | Be paranoid, use gmallocn or gmallocn3 in all gmalloc with * | 0 | void PSOutputDev::clipToStrokePath(GfxState *state) {
doPath(state->getPath());
writePS("Ws\n");
}
| 85,772,628,117,546,610,000,000,000,000,000,000,000 | PSOutputDev.cc | 240,959,014,758,376,760,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,796 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | Splash::Splash(SplashBitmap *bitmapA, GBool vectorAntialiasA,
SplashScreenParams *screenParams) {
int i;
bitmap = bitmapA;
vectorAntialias = vectorAntialiasA;
state = new SplashState(bitmap->width, bitmap->height, vectorAntialias,
screenParams);
if (vectorAntialias) {
aaBuf = new SplashBitmap(splashAASize * bitmap->width, splashAASize,
1, splashModeMono1, gFalse);
for (i = 0; i <= splashAASize * splashAASize; ++i) {
aaGamma[i] = splashPow((SplashCoord)i /
(SplashCoord)(splashAASize * splashAASize),
1.5);
}
} else {
aaBuf = NULL;
}
clearModRegion();
debugMode = gFalse;
}
| 213,582,906,655,719,600,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,797 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | Splash::Splash(SplashBitmap *bitmapA, GBool vectorAntialiasA,
SplashScreen *screenA) {
int i;
bitmap = bitmapA;
vectorAntialias = vectorAntialiasA;
state = new SplashState(bitmap->width, bitmap->height, vectorAntialias,
screenA);
if (vectorAntialias) {
aaBuf = new SplashBitmap(splashAASize * bitmap->width, splashAASize,
1, splashModeMono1, gFalse);
for (i = 0; i <= splashAASize * splashAASize; ++i) {
aaGamma[i] = splashPow((SplashCoord)i /
(SplashCoord)(splashAASize * splashAASize),
1.5);
}
} else {
aaBuf = NULL;
}
clearModRegion();
debugMode = gFalse;
}
| 35,020,385,007,897,190,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,798 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | static void blendXor(SplashColorPtr src, SplashColorPtr dest,
SplashColorPtr blend, SplashColorMode cm) {
int i;
for (i = 0; i < splashColorModeNComps[cm]; ++i) {
blend[i] = src[i] ^ dest[i];
}
}
| 163,043,926,610,167,760,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,799 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::blitTransparent(SplashBitmap *src, int xSrc, int ySrc,
int xDest, int yDest, int w, int h) {
SplashColor pixel;
SplashColorPtr p;
Guchar *q;
int x, y, mask;
if (src->mode != bitmap->mode) {
return splashErrModeMismatch;
}
switch (bitmap->mode) {
case splashModeMono1:
for (y = 0; y < h; ++y) {
p = &bitmap->data[(yDest + y) * bitmap->rowSize + (xDest >> 3)];
mask = 0x80 >> (xDest & 7);
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
if (pixel[0]) {
*p |= mask;
} else {
*p &= ~mask;
}
if (!(mask >>= 1)) {
mask = 0x80;
++p;
}
}
}
break;
case splashModeMono8:
for (y = 0; y < h; ++y) {
p = &bitmap->data[(yDest + y) * bitmap->rowSize + xDest];
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
*p++ = pixel[0];
}
}
break;
case splashModeRGB8:
case splashModeBGR8:
for (y = 0; y < h; ++y) {
p = &bitmap->data[(yDest + y) * bitmap->rowSize + 3 * xDest];
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
*p++ = pixel[0];
*p++ = pixel[1];
*p++ = pixel[2];
}
}
break;
case splashModeXBGR8:
for (y = 0; y < h; ++y) {
p = &bitmap->data[(yDest + y) * bitmap->rowSize + 4 * xDest];
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
*p++ = pixel[0];
*p++ = pixel[1];
*p++ = pixel[2];
*p++ = 255;
}
}
break;
#if SPLASH_CMYK
case splashModeCMYK8:
for (y = 0; y < h; ++y) {
p = &bitmap->data[(yDest + y) * bitmap->rowSize + 4 * xDest];
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
*p++ = pixel[0];
*p++ = pixel[1];
*p++ = pixel[2];
*p++ = pixel[3];
}
}
break;
#endif
}
if (bitmap->alpha) {
for (y = 0; y < h; ++y) {
q = &bitmap->alpha[(yDest + y) * bitmap->width + xDest];
for (x = 0; x < w; ++x) {
*q++ = 0x00;
}
}
}
return splashOk;
}
| 298,221,188,693,200,180,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,800 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::clearModRegion() {
modXMin = bitmap->getWidth();
modYMin = bitmap->getHeight();
modXMax = -1;
modYMax = -1;
}
| 15,505,397,397,258,686,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,801 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::clipResetToRect(SplashCoord x0, SplashCoord y0,
SplashCoord x1, SplashCoord y1) {
state->clip->resetToRect(x0, y0, x1, y1);
}
| 135,680,312,637,219,560,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,802 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::clipToPath(SplashPath *path, GBool eo) {
return state->clip->clipToPath(path, state->matrix, state->flatness, eo);
}
| 272,256,100,253,411,600,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,803 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::clipToRect(SplashCoord x0, SplashCoord y0,
SplashCoord x1, SplashCoord y1) {
return state->clip->clipToRect(x0, y0, x1, y1);
}
| 107,657,949,004,828,000,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,804 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::composite(SplashBitmap *src, int xSrc, int ySrc,
int xDest, int yDest, int w, int h,
GBool noClip, GBool nonIsolated) {
SplashPipe pipe;
SplashColor pixel;
Guchar alpha;
Guchar *ap;
int x, y;
if (src->mode != bitmap->mode) {
return splashErrModeMismatch;
}
if (src->alpha) {
pipeInit(&pipe, xDest, yDest, NULL, pixel, state->fillAlpha,
gTrue, nonIsolated);
for (y = 0; y < h; ++y) {
pipeSetXY(&pipe, xDest, yDest + y);
ap = src->getAlphaPtr() + (ySrc + y) * src->getWidth() + xSrc;
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
alpha = *ap++;
if (noClip || state->clip->test(xDest + x, yDest + y)) {
pipe.shape = (SplashCoord)(alpha / 255.0);
pipeRun(&pipe);
updateModX(xDest + x);
updateModY(yDest + y);
} else {
pipeIncX(&pipe);
}
}
}
} else {
pipeInit(&pipe, xDest, yDest, NULL, pixel, state->fillAlpha,
gFalse, nonIsolated);
for (y = 0; y < h; ++y) {
pipeSetXY(&pipe, xDest, yDest + y);
for (x = 0; x < w; ++x) {
src->getPixel(xSrc + x, ySrc + y, pixel);
if (noClip || state->clip->test(xDest + x, yDest + y)) {
pipeRun(&pipe);
updateModX(xDest + x);
updateModY(yDest + y);
} else {
pipeIncX(&pipe);
}
}
}
}
return splashOk;
}
| 1,893,886,900,122,198,200,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,805 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | inline void Splash::drawAALine(SplashPipe *pipe, int x0, int x1, int y) {
#if splashAASize == 4
static int bitCount4[16] = { 0, 1, 1, 2, 1, 2, 2, 3,
1, 2, 2, 3, 2, 3, 3, 4 };
SplashColorPtr p0, p1, p2, p3;
int t;
#else
SplashColorPtr p;
int xx, yy, t;
#endif
int x;
#if splashAASize == 4
p0 = aaBuf->getDataPtr() + (x0 >> 1);
p1 = p0 + aaBuf->getRowSize();
p2 = p1 + aaBuf->getRowSize();
p3 = p2 + aaBuf->getRowSize();
#endif
pipeSetXY(pipe, x0, y);
for (x = x0; x <= x1; ++x) {
#if splashAASize == 4
if (x & 1) {
t = bitCount4[*p0 & 0x0f] + bitCount4[*p1 & 0x0f] +
bitCount4[*p2 & 0x0f] + bitCount4[*p3 & 0x0f];
++p0; ++p1; ++p2; ++p3;
} else {
t = bitCount4[*p0 >> 4] + bitCount4[*p1 >> 4] +
bitCount4[*p2 >> 4] + bitCount4[*p3 >> 4];
}
#else
t = 0;
for (yy = 0; yy < splashAASize; ++yy) {
for (xx = 0; xx < splashAASize; ++xx) {
p = aaBuf->getDataPtr() + yy * aaBuf->getRowSize() +
((x * splashAASize + xx) >> 3);
t += (*p >> (7 - ((x * splashAASize + xx) & 7))) & 1;
}
}
#endif
if (t != 0) {
pipe->shape = aaGamma[t];
pipeRun(pipe);
updateModX(x);
updateModY(y);
} else {
pipeIncX(pipe);
}
}
}
| 48,089,619,393,677,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,806 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | inline void Splash::drawAAPixel(SplashPipe *pipe, int x, int y) {
#if splashAASize == 4
static int bitCount4[16] = { 0, 1, 1, 2, 1, 2, 2, 3,
1, 2, 2, 3, 2, 3, 3, 4 };
int w;
#else
int xx, yy;
#endif
SplashColorPtr p;
int x0, x1, t;
if (x < 0 || x >= bitmap->width ||
y < state->clip->getYMinI() || y > state->clip->getYMaxI()) {
return;
}
if (y != aaBufY) {
memset(aaBuf->getDataPtr(), 0xff,
aaBuf->getRowSize() * aaBuf->getHeight());
x0 = 0;
x1 = bitmap->width - 1;
state->clip->clipAALine(aaBuf, &x0, &x1, y);
aaBufY = y;
}
#if splashAASize == 4
p = aaBuf->getDataPtr() + (x >> 1);
w = aaBuf->getRowSize();
if (x & 1) {
t = bitCount4[*p & 0x0f] + bitCount4[p[w] & 0x0f] +
bitCount4[p[2*w] & 0x0f] + bitCount4[p[3*w] & 0x0f];
} else {
t = bitCount4[*p >> 4] + bitCount4[p[w] >> 4] +
bitCount4[p[2*w] >> 4] + bitCount4[p[3*w] >> 4];
}
#else
t = 0;
for (yy = 0; yy < splashAASize; ++yy) {
for (xx = 0; xx < splashAASize; ++xx) {
p = aaBuf->getDataPtr() + yy * aaBuf->getRowSize() +
((x * splashAASize + xx) >> 3);
t += (*p >> (7 - ((x * splashAASize + xx) & 7))) & 1;
}
}
#endif
if (t != 0) {
pipeSetXY(pipe, x, y);
pipe->shape *= aaGamma[t];
pipeRun(pipe);
updateModX(x);
updateModY(y);
}
}
| 130,574,050,427,456,970,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,807 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | inline void Splash::drawAAPixelInit() {
aaBufY = -1;
}
| 205,106,454,289,664,040,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,808 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | inline void Splash::drawPixel(SplashPipe *pipe, int x, int y, GBool noClip) {
if (noClip || state->clip->test(x, y)) {
pipeSetXY(pipe, x, y);
pipeRun(pipe);
updateModX(x);
updateModY(y);
}
}
| 122,866,303,693,619,650,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,809 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | inline void Splash::drawSpan(SplashPipe *pipe, int x0, int x1, int y,
GBool noClip) {
int x;
pipeSetXY(pipe, x0, y);
if (noClip) {
for (x = x0; x <= x1; ++x) {
pipeRun(pipe);
}
updateModX(x0);
updateModX(x1);
updateModY(y);
} else {
for (x = x0; x <= x1; ++x) {
if (state->clip->test(x, y)) {
pipeRun(pipe);
updateModX(x);
updateModY(y);
} else {
pipeIncX(pipe);
}
}
}
}
| 33,001,122,571,646,644,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,810 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::dumpPath(SplashPath *path) {
int i;
for (i = 0; i < path->length; ++i) {
printf(" %3d: x=%8.2f y=%8.2f%s%s%s%s\n",
i, (double)path->pts[i].x, (double)path->pts[i].y,
(path->flags[i] & splashPathFirst) ? " first" : "",
(path->flags[i] & splashPathLast) ? " last" : "",
(path->flags[i] & splashPathClosed) ? " closed" : "",
(path->flags[i] & splashPathCurve) ? " curve" : "");
}
}
| 3,437,379,472,541,891,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,811 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::dumpXPath(SplashXPath *path) {
int i;
for (i = 0; i < path->length; ++i) {
printf(" %4d: x0=%8.2f y0=%8.2f x1=%8.2f y1=%8.2f %s%s%s%s%s%s%s\n",
i, (double)path->segs[i].x0, (double)path->segs[i].y0,
(double)path->segs[i].x1, (double)path->segs[i].y1,
(path->segs[i].flags & splashXPathFirst) ? "F" : " ",
(path->segs[i].flags & splashXPathLast) ? "L" : " ",
(path->segs[i].flags & splashXPathEnd0) ? "0" : " ",
(path->segs[i].flags & splashXPathEnd1) ? "1" : " ",
(path->segs[i].flags & splashXPathHoriz) ? "H" : " ",
(path->segs[i].flags & splashXPathVert) ? "V" : " ",
(path->segs[i].flags & splashXPathFlip) ? "P" : " ");
}
}
| 285,767,969,321,408,300,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,812 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::fillChar(SplashCoord x, SplashCoord y,
int c, SplashFont *font) {
SplashGlyphBitmap glyph;
SplashCoord xt, yt;
int x0, y0, xFrac, yFrac;
SplashClipResult clipRes;
if (debugMode) {
printf("fillChar: x=%.2f y=%.2f c=%3d=0x%02x='%c'\n",
(double)x, (double)y, c, c, c);
}
transform(state->matrix, x, y, &xt, &yt);
x0 = splashFloor(xt);
xFrac = splashFloor((xt - x0) * splashFontFraction);
y0 = splashFloor(yt);
yFrac = splashFloor((yt - y0) * splashFontFraction);
if (!font->getGlyph(c, xFrac, yFrac, &glyph, x0, y0, state->clip, &clipRes)) {
return splashErrNoGlyph;
}
if (clipRes != splashClipAllOutside) {
fillGlyph2(x0, y0, &glyph, clipRes == splashClipAllInside);
}
opClipRes = clipRes;
if (glyph.freeData) {
gfree(glyph.data);
}
return splashOk;
}
| 27,693,676,325,322,123,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,813 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::fillGlyph(SplashCoord x, SplashCoord y,
SplashGlyphBitmap *glyph) {
SplashCoord xt, yt;
int x0, y0;
transform(state->matrix, x, y, &xt, &yt);
x0 = splashFloor(xt);
y0 = splashFloor(yt);
SplashClipResult clipRes = state->clip->testRect(x0 - glyph->x,
y0 - glyph->y,
x0 - glyph->x + glyph->w - 1,
y0 - glyph->y + glyph->h - 1);
if (clipRes != splashClipAllOutside) {
fillGlyph2(x0, y0, glyph, clipRes == splashClipAllInside);
}
opClipRes = clipRes;
}
| 262,083,421,112,313,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,814 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::fillGlyph2(int x0, int y0, SplashGlyphBitmap *glyph, GBool noClip) {
SplashPipe pipe;
int alpha0, alpha;
Guchar *p;
int x1, y1, xx, xx1, yy;
p = glyph->data;
int xStart = x0 - glyph->x;
int yStart = y0 - glyph->y;
int xxLimit = glyph->w;
int yyLimit = glyph->h;
if (yStart < 0)
{
p += glyph->w * -yStart; // move p to the beginning of the first painted row
yyLimit += yStart;
yStart = 0;
}
if (xStart < 0)
{
p += -xStart; // move p to the first painted pixel
xxLimit += xStart;
xStart = 0;
}
if (xxLimit + xStart >= bitmap->width) xxLimit = bitmap->width - xStart;
if (yyLimit + yStart >= bitmap->height) yyLimit = bitmap->height - yStart;
if (noClip) {
if (glyph->aa) {
pipeInit(&pipe, xStart, yStart,
state->fillPattern, NULL, state->fillAlpha, gTrue, gFalse);
for (yy = 0, y1 = yStart; yy < yyLimit; ++yy, ++y1) {
pipeSetXY(&pipe, xStart, y1);
for (xx = 0, x1 = xStart; xx < xxLimit; ++xx, ++x1) {
alpha = p[xx];
if (alpha != 0) {
pipe.shape = (SplashCoord)(alpha / 255.0);
pipeRun(&pipe);
updateModX(x1);
updateModY(y1);
} else {
pipeIncX(&pipe);
}
}
p += glyph->w;
}
} else {
const int widthEight = splashCeil(glyph->w / 8.0);
pipeInit(&pipe, xStart, yStart,
state->fillPattern, NULL, state->fillAlpha, gFalse, gFalse);
for (yy = 0, y1 = yStart; yy < yyLimit; ++yy, ++y1) {
pipeSetXY(&pipe, xStart, y1);
for (xx = 0, x1 = xStart; xx < xxLimit; xx += 8) {
alpha0 = p[xx / 8];
for (xx1 = 0; xx1 < 8 && xx + xx1 < xxLimit; ++xx1, ++x1) {
if (alpha0 & 0x80) {
pipeRun(&pipe);
updateModX(x1);
updateModY(y1);
} else {
pipeIncX(&pipe);
}
alpha0 <<= 1;
}
}
p += widthEight;
}
}
} else {
if (glyph->aa) {
pipeInit(&pipe, xStart, yStart,
state->fillPattern, NULL, state->fillAlpha, gTrue, gFalse);
for (yy = 0, y1 = yStart; yy < yyLimit; ++yy, ++y1) {
pipeSetXY(&pipe, xStart, y1);
for (xx = 0, x1 = xStart; xx < xxLimit; ++xx, ++x1) {
if (state->clip->test(x1, y1)) {
alpha = p[xx];
if (alpha != 0) {
pipe.shape = (SplashCoord)(alpha / 255.0);
pipeRun(&pipe);
updateModX(x1);
updateModY(y1);
} else {
pipeIncX(&pipe);
}
} else {
pipeIncX(&pipe);
}
}
p += glyph->w;
}
} else {
const int widthEight = splashCeil(glyph->w / 8.0);
pipeInit(&pipe, xStart, yStart,
state->fillPattern, NULL, state->fillAlpha, gFalse, gFalse);
for (yy = 0, y1 = yStart; yy < yyLimit; ++yy, ++y1) {
pipeSetXY(&pipe, xStart, y1);
for (xx = 0, x1 = xStart; xx < xxLimit; xx += 8) {
alpha0 = p[xx / 8];
for (xx1 = 0; xx1 < 8 && xx + xx1 < xxLimit; ++xx1, ++x1) {
if (state->clip->test(x1, y1)) {
if (alpha0 & 0x80) {
pipeRun(&pipe);
updateModX(x1);
updateModY(y1);
} else {
pipeIncX(&pipe);
}
} else {
pipeIncX(&pipe);
}
alpha0 <<= 1;
}
}
p += widthEight;
}
}
}
}
| 336,321,841,914,861,670,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,815 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashError Splash::fillWithPattern(SplashPath *path, GBool eo,
SplashPattern *pattern,
SplashCoord alpha) {
SplashPipe pipe;
SplashXPath *xPath;
SplashXPathScanner *scanner;
int xMinI, yMinI, xMaxI, yMaxI, x0, x1, y;
SplashClipResult clipRes, clipRes2;
if (path->length == 0) {
return splashErrEmptyPath;
}
xPath = new SplashXPath(path, state->matrix, state->flatness, gTrue);
if (vectorAntialias) {
xPath->aaScale();
}
xPath->sort();
scanner = new SplashXPathScanner(xPath, eo);
if (vectorAntialias) {
scanner->getBBoxAA(&xMinI, &yMinI, &xMaxI, &yMaxI);
} else {
scanner->getBBox(&xMinI, &yMinI, &xMaxI, &yMaxI);
}
if ((clipRes = state->clip->testRect(xMinI, yMinI, xMaxI, yMaxI))
!= splashClipAllOutside) {
if (yMinI < state->clip->getYMinI()) {
yMinI = state->clip->getYMinI();
}
if (yMaxI > state->clip->getYMaxI()) {
yMaxI = state->clip->getYMaxI();
}
pipeInit(&pipe, 0, yMinI, pattern, NULL, alpha, vectorAntialias, gFalse);
if (vectorAntialias) {
for (y = yMinI; y <= yMaxI; ++y) {
scanner->renderAALine(aaBuf, &x0, &x1, y);
if (clipRes != splashClipAllInside) {
state->clip->clipAALine(aaBuf, &x0, &x1, y);
}
drawAALine(&pipe, x0, x1, y);
}
} else {
for (y = yMinI; y <= yMaxI; ++y) {
while (scanner->getNextSpan(y, &x0, &x1)) {
if (clipRes == splashClipAllInside) {
drawSpan(&pipe, x0, x1, y, gTrue);
} else {
if (x0 < state->clip->getXMinI()) {
x0 = state->clip->getXMinI();
}
if (x1 > state->clip->getXMaxI()) {
x1 = state->clip->getXMaxI();
}
clipRes2 = state->clip->testSpan(x0, x1, y);
drawSpan(&pipe, x0, x1, y, clipRes2 == splashClipAllInside);
}
}
}
}
}
opClipRes = clipRes;
delete scanner;
delete xPath;
return splashOk;
}
| 40,298,421,312,332,540,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,816 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | void Splash::flattenCurve(SplashCoord x0, SplashCoord y0,
SplashCoord x1, SplashCoord y1,
SplashCoord x2, SplashCoord y2,
SplashCoord x3, SplashCoord y3,
SplashCoord *matrix, SplashCoord flatness2,
SplashPath *fPath) {
SplashCoord cx[splashMaxCurveSplits + 1][3];
SplashCoord cy[splashMaxCurveSplits + 1][3];
int cNext[splashMaxCurveSplits + 1];
SplashCoord xl0, xl1, xl2, xr0, xr1, xr2, xr3, xx1, xx2, xh;
SplashCoord yl0, yl1, yl2, yr0, yr1, yr2, yr3, yy1, yy2, yh;
SplashCoord dx, dy, mx, my, tx, ty, d1, d2;
int p1, p2, p3;
p1 = 0;
p2 = splashMaxCurveSplits;
cx[p1][0] = x0; cy[p1][0] = y0;
cx[p1][1] = x1; cy[p1][1] = y1;
cx[p1][2] = x2; cy[p1][2] = y2;
cx[p2][0] = x3; cy[p2][0] = y3;
cNext[p1] = p2;
while (p1 < splashMaxCurveSplits) {
xl0 = cx[p1][0]; yl0 = cy[p1][0];
xx1 = cx[p1][1]; yy1 = cy[p1][1];
xx2 = cx[p1][2]; yy2 = cy[p1][2];
p2 = cNext[p1];
xr3 = cx[p2][0]; yr3 = cy[p2][0];
transform(matrix, (xl0 + xr3) * 0.5, (yl0 + yr3) * 0.5, &mx, &my);
transform(matrix, xx1, yy1, &tx, &ty);
dx = tx - mx;
dy = ty - my;
d1 = dx*dx + dy*dy;
transform(matrix, xx2, yy2, &tx, &ty);
dx = tx - mx;
dy = ty - my;
d2 = dx*dx + dy*dy;
if (p2 - p1 == 1 || (d1 <= flatness2 && d2 <= flatness2)) {
fPath->lineTo(xr3, yr3);
p1 = p2;
} else {
xl1 = (xl0 + xx1) * 0.5;
yl1 = (yl0 + yy1) * 0.5;
xh = (xx1 + xx2) * 0.5;
yh = (yy1 + yy2) * 0.5;
xl2 = (xl1 + xh) * 0.5;
yl2 = (yl1 + yh) * 0.5;
xr2 = (xx2 + xr3) * 0.5;
yr2 = (yy2 + yr3) * 0.5;
xr1 = (xh + xr2) * 0.5;
yr1 = (yh + yr2) * 0.5;
xr0 = (xl2 + xr1) * 0.5;
yr0 = (yl2 + yr1) * 0.5;
p3 = (p1 + p2) / 2;
cx[p1][1] = xl1; cy[p1][1] = yl1;
cx[p1][2] = xl2; cy[p1][2] = yl2;
cNext[p1] = p3;
cx[p3][0] = xr0; cy[p3][0] = yr0;
cx[p3][1] = xr1; cy[p3][1] = yr1;
cx[p3][2] = xr2; cy[p3][2] = yr2;
cNext[p3] = p2;
}
}
}
| 96,017,361,021,376,070,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,817 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashPath *Splash::flattenPath(SplashPath *path, SplashCoord *matrix,
SplashCoord flatness) {
SplashPath *fPath;
SplashCoord flatness2;
Guchar flag;
int i;
fPath = new SplashPath();
flatness2 = flatness * flatness;
i = 0;
while (i < path->length) {
flag = path->flags[i];
if (flag & splashPathFirst) {
fPath->moveTo(path->pts[i].x, path->pts[i].y);
++i;
} else {
if (flag & splashPathCurve) {
flattenCurve(path->pts[i-1].x, path->pts[i-1].y,
path->pts[i ].x, path->pts[i ].y,
path->pts[i+1].x, path->pts[i+1].y,
path->pts[i+2].x, path->pts[i+2].y,
matrix, flatness2, fPath);
i += 3;
} else {
fPath->lineTo(path->pts[i].x, path->pts[i].y);
++i;
}
if (path->flags[i-1] & splashPathClosed) {
fPath->close();
}
}
}
return fPath;
}
| 315,151,884,676,296,700,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,818 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashBlendFunc Splash::getBlendFunc() {
return state->blendFunc;
}
| 100,256,187,423,485,730,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,819 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashClip *Splash::getClip() {
return state->clip;
}
| 23,542,473,232,908,336,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,820 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashPattern *Splash::getFillPattern() {
return state->fillPattern;
}
| 270,647,504,193,966,660,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,821 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord Splash::getFlatness() {
return state->flatness;
}
| 23,954,582,033,373,573,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,822 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | GBool Splash::getInNonIsolatedGroup() {
return state->inNonIsolatedGroup;
}
| 113,190,721,483,386,960,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,823 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | int Splash::getLineCap() {
return state->lineCap;
}
| 65,961,550,608,007,170,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,824 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord *Splash::getLineDash() {
return state->lineDash;
}
| 163,872,567,066,851,630,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,825 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | int Splash::getLineDashLength() {
return state->lineDashLength;
}
| 222,465,261,660,221,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,826 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord Splash::getLineDashPhase() {
return state->lineDashPhase;
}
| 186,521,014,374,465,440,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,827 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord Splash::getLineWidth() {
return state->lineWidth;
}
| 328,721,993,136,568,330,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,828 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord *Splash::getMatrix() {
return state->matrix;
}
| 152,372,382,067,147,130,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,829 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord Splash::getMiterLimit() {
return state->miterLimit;
}
| 199,038,869,353,419,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,830 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashScreen *Splash::getScreen() {
return state->screen;
}
| 29,763,148,687,419,203,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,831 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashBitmap *Splash::getSoftMask() {
return state->softMask;
}
| 110,001,633,220,041,390,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,832 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashCoord Splash::getStrokeAlpha() {
return state->strokeAlpha;
}
| 216,908,500,801,377,300,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,833 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc β gmallocn | 0 | SplashPattern *Splash::getStrokePattern() {
return state->strokePattern;
}
| 206,230,655,246,862,470,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791. | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |