fkie_cve-2005-3191
Vulnerability from fkie_nvd
Published
2005-12-07 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
cve@mitre.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2005-868.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17897Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17908Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17912Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17916Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17920Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17921Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17926Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17929Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17940Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17955
cve@mitre.orghttp://secunia.com/advisories/17976Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18055Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18061Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18147
cve@mitre.orghttp://secunia.com/advisories/18189Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18191Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18192Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18303
cve@mitre.orghttp://secunia.com/advisories/18313Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18336Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18349Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18380
cve@mitre.orghttp://secunia.com/advisories/18385Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18387Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18389
cve@mitre.orghttp://secunia.com/advisories/18398
cve@mitre.orghttp://secunia.com/advisories/18407
cve@mitre.orghttp://secunia.com/advisories/18416Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18428
cve@mitre.orghttp://secunia.com/advisories/18436
cve@mitre.orghttp://secunia.com/advisories/18448
cve@mitre.orghttp://secunia.com/advisories/18503
cve@mitre.orghttp://secunia.com/advisories/18517
cve@mitre.orghttp://secunia.com/advisories/18534
cve@mitre.orghttp://secunia.com/advisories/18549
cve@mitre.orghttp://secunia.com/advisories/18554
cve@mitre.orghttp://secunia.com/advisories/18582
cve@mitre.orghttp://secunia.com/advisories/18674
cve@mitre.orghttp://secunia.com/advisories/18675
cve@mitre.orghttp://secunia.com/advisories/18679
cve@mitre.orghttp://secunia.com/advisories/18908
cve@mitre.orghttp://secunia.com/advisories/18913
cve@mitre.orghttp://secunia.com/advisories/19230
cve@mitre.orghttp://secunia.com/advisories/19377
cve@mitre.orghttp://secunia.com/advisories/19797
cve@mitre.orghttp://secunia.com/advisories/19798
cve@mitre.orghttp://secunia.com/advisories/25729
cve@mitre.orghttp://secunia.com/advisories/26413
cve@mitre.orghttp://securityreason.com/securityalert/233
cve@mitre.orghttp://securityreason.com/securityalert/234
cve@mitre.orghttp://securitytracker.com/id?1015309
cve@mitre.orghttp://securitytracker.com/id?1015324
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-931
cve@mitre.orghttp://www.debian.org/security/2005/dsa-932
cve@mitre.orghttp://www.debian.org/security/2005/dsa-937
cve@mitre.orghttp://www.debian.org/security/2005/dsa-938
cve@mitre.orghttp://www.debian.org/security/2005/dsa-940
cve@mitre.orghttp://www.debian.org/security/2006/dsa-936
cve@mitre.orghttp://www.debian.org/security/2006/dsa-950
cve@mitre.orghttp://www.debian.org/security/2006/dsa-961
cve@mitre.orghttp://www.debian.org/security/2006/dsa-962
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=342&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=343&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.kde.org/info/security/advisory-20051207-1.txt
cve@mitre.orghttp://www.kde.org/info/security/advisory-20051207-2.txt
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:003
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:004
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:005
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:006
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:008
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:010
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:011
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:012
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_29_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_02_sr.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-840.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-867.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-878.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0160.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/418883/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/427053/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/427990/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/15726
cve@mitre.orghttp://www.securityfocus.com/bid/15727
cve@mitre.orghttp://www.trustix.org/errata/2005/0072/
cve@mitre.orghttp://www.ubuntulinux.org/usn/usn-227-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2786
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2787
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2788
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2789
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2790
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2856
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2280
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23443
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23444
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1609
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2005-868.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17897Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17908Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17912Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17916Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17920Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17921Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17926Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17929Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17940Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17955
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17976Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18055Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18061Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18147
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18189Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18191Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18192Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18303
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18313Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18336Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18349Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18385Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18387Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18389
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18398
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18407
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18416Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18428
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18436
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18448
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18517
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18534
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18549
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18554
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18582
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18674
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18675
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18679
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18908
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18913
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19797
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19798
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25729
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26413
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/233
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/234
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015309
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015324
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-931
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-932
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-938
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-940
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-936
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-950
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-961
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-962
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=342&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=343&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20051207-1.txt
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20051207-2.txt
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_29_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_02_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-840.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-867.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-878.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0160.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/418883/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427053/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427990/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15726
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15727
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0072/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntulinux.org/usn/usn-227-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2786
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2787
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2788
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2789
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2790
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2856
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2280
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1609
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
Impacted products
Vendor Product Version
xpdf xpdf 0.90
xpdf xpdf 0.91
xpdf xpdf 0.92
xpdf xpdf 0.93
xpdf xpdf 1.0
xpdf xpdf 1.0a
xpdf xpdf 1.1
xpdf xpdf 2.0
xpdf xpdf 2.1
xpdf xpdf 2.2
xpdf xpdf 2.3
xpdf xpdf 3.0
xpdf xpdf 3.0.1
xpdf xpdf 3.0_pl2
xpdf xpdf 3.0_pl3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CC6233-E207-40CC-81FF-A8670EEA4295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304E1E3-8766-40D0-8879-A652B4E9E72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "188F1343-8082-4B54-8DA4-E344818ABD52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "354487CF-0086-4AE2-872B-0032E3EB89EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96767060-505A-42D2-A68A-6AD810DE800A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1169B802-7279-437F-AF59-621A67DC92EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B77866E-6818-4DE6-9457-39416871952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D23CF8-2B6C-4D2A-8E5E-6AACE99A7C19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107B531-7254-4908-97F0-3BF1EA0495AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index."
    }
  ],
  "id": "CVE-2005-3191",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2005-12-07T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17897"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17908"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17912"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17916"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17920"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17921"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17926"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17929"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17940"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17955"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17976"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18055"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18061"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18147"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18189"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18191"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18192"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18303"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18313"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18336"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18349"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18380"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18385"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18387"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18389"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18398"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18407"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18416"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18428"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18436"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18448"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18517"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18534"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18549"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18554"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18674"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18675"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18679"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18908"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18913"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19230"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19377"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19797"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19798"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25729"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/234"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015309"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015324"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-931"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-932"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-937"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-938"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-940"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-936"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-961"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-962"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15726"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15727"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2005/0072/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntulinux.org/usn/usn-227-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2787"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2788"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2789"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2790"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2856"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2280"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1609"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17912"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17921"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17926"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18349"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18436"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18549"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18913"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/234"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-961"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-962"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15727"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2005/0072/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntulinux.org/usn/usn-227-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…