CVE-2005-3193
Published Dec 7, 2005
Last updated 6 years ago
Overview
- Description
- Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Vendor comments
- Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28CC6233-E207-40CC-81FF-A8670EEA4295" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0304E1E3-8766-40D0-8879-A652B4E9E72D" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "188F1343-8082-4B54-8DA4-E344818ABD52" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "354487CF-0086-4AE2-872B-0032E3EB89EE" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96767060-505A-42D2-A68A-6AD810DE800A" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1169B802-7279-437F-AF59-621A67DC92EC" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B93B3ED-AF82-49A9-8C7F-E5F652F19669" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B77866E-6818-4DE6-9457-39416871952C" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6D23CF8-2B6C-4D2A-8E5E-6AACE99A7C19" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9107B531-7254-4908-97F0-3BF1EA0495AC" } ], "operator": "OR" } ] } ]