Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00784.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00750.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/53801
https://bugzilla.redhat.com/show_bug.cgi?id=526924
http://www.vupen.com/english/advisories/2009/2925
http://www.ubuntu.com/usn/USN-850-3
http://www.ubuntu.com/usn/USN-850-1
http://www.securityfocus.com/bid/36718
http://www.openwall.com/lists/oss-security/2009/12/01/6
http://www.openwall.com/lists/oss-security/2009/12/01/5
http://www.openwall.com/lists/oss-security/2009/12/01/1
http://www.mandriva.com/security/advisories?name=MDVSA-2011:175
http://www.debian.org/security/2009/dsa-1941
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021706.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274030-1
http://secunia.com/advisories/37159
http://secunia.com/advisories/37114
http://secunia.com/advisories/37054
http://cgit.freedesktop.org/poppler/poppler/commit/?id=c839b706