Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
cgit.freedesktop.org/poppler/poppler/commit/?id=c839b706
secunia.com/advisories/37054
secunia.com/advisories/37114
secunia.com/advisories/37159
sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
www.debian.org/security/2009/dsa-1941
www.mandriva.com/security/advisories?name=MDVSA-2011:175
www.openwall.com/lists/oss-security/2009/12/01/1
www.openwall.com/lists/oss-security/2009/12/01/5
www.openwall.com/lists/oss-security/2009/12/01/6
www.securityfocus.com/bid/36718
www.ubuntu.com/usn/USN-850-1
www.ubuntu.com/usn/USN-850-3
www.vupen.com/english/advisories/2009/2925
bugzilla.redhat.com/show_bug.cgi?id=526924
exchange.xforce.ibmcloud.com/vulnerabilities/53801
www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html