Vulnerability Name:

CVE-2005-0064 (CCN-18950)

Assigned:2005-01-18
Published:2005-01-18
Updated:2017-10-11
Summary:Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Patch
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch

Source: SCO
Type: UNKNOWN
SCOSA-2005.42

Source: CCN
Type: BugTraq Mailing List, Thu Jun 09 2005 - 12:36:25 CDT
libextractor: Multiple overflow vulnerabilities

Source: MITRE
Type: CNA
CVE-2005-0064

Source: CONECTIVA
Type: Patch, Vendor Advisory
CLA-2005:921

Source: CCN
Type: libExtractor Download Web page
libExtractor - download page

Source: BUGTRAQ
Type: UNKNOWN
20050119 [USN-64-1] xpdf, CUPS vulnerabilities

Source: CCN
Type: RHSA-2005-026
tetex security update

Source: CCN
Type: RHSA-2005-034
xpdf security update

Source: CCN
Type: RHSA-2005-049
cups security update

Source: CCN
Type: RHSA-2005-053
CUPS security update

Source: CCN
Type: RHSA-2005-057
gpdf security update

Source: CCN
Type: RHSA-2005-059
xpdf security update

Source: CCN
Type: RHSA-2005-066
kdegraphics security update

Source: SECUNIA
Type: UNKNOWN
17277

Source: CCN
Type: CIAC Information Bulletin P-142
XPDF/GPDF - CUPS Vulnerabilities

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-645

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-648

Source: DEBIAN
Type: DSA-645
cupsys -- buffer overflow

Source: DEBIAN
Type: DSA-648
xpdf -- buffer overflow

Source: CCN
Type: Xpdf Web site
Xpdf: Download

Source: CCN
Type: GLSA-200501-28
Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2

Source: CCN
Type: GLSA-200501-30
CUPS: Stack overflow in included Xpdf code

Source: CCN
Type: GLSA-200501-31
teTeX, pTeX, CSTeX: Multiple vulnerabilities

Source: CCN
Type: GLSA-200501-32
KPdf, KOffice: Stack overflow in included Xpdf code

Source: CCN
Type: GLSA-200502-10
pdftohtml: Vulnerabilities in included Xpdf

Source: CCN
Type: GLSA-200506-06
libextractor: Multiple overflow vulnerabilities

Source: CCN
Type: iDEFENSE Security Advisory 01.18.05
Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow

Source: IDEFENSE
Type: Exploit, Patch, Vendor Advisory
20050118 Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow

Source: CCN
Type: KDE Security Advisory 20050119-1
kpdf Buffer Overflow Vulnerability

Source: CCN
Type: KDE Security Advisory 20050120-1
KOffice PDF Import Filter Vulnerability

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:016

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:017

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:018

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:019

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:020

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:021

Source: REDHAT
Type: UNKNOWN
RHSA-2005:026

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:034

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:053

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:057

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:059

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:066

Source: CCN
Type: BID-12302
XPDF MAKEFILEKEY2 Function Remote Buffer Overflow Vulnerability

Source: CCN
Type: BID-13922
Libextractor Multiple Remote Buffer Overflow Vulnerabilities

Source: TRUSTIX
Type: Patch, Vendor Advisory
2005-0003

Source: CCN
Type: USN-64-1
xpdf

Source: FEDORA
Type: Patch, Vendor Advisory
FLSA:2352

Source: FEDORA
Type: Patch, Vendor Advisory
FLSA:2353

Source: XF
Type: UNKNOWN
xpdf-makefilekey2-bo(18950)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11781

Source: GENTOO
Type: UNKNOWN
GLSA-200501-28

Source: GENTOO
Type: UNKNOWN
GLSA-200502-10

Source: SUSE
Type: SUSE-SR:2005:002
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2005:003
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2005:008
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:3.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:kde:kpdf:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20050064
    V
    CVE-2005-0064
    2015-11-16
    oval:org.mitre.oval:def:11781
    V
    Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.
    2013-04-29
    oval:com.redhat.rhsa:def:20050026
    P
    RHSA-2005:026: tetex security update (Moderate)
    2005-03-16
    oval:com.redhat.rhsa:def:20050057
    P
    RHSA-2005:057: gpdf security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050034
    P
    RHSA-2005:034: xpdf security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050066
    P
    RHSA-2005:066: kdegraphics security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050053
    P
    RHSA-2005:053: CUPS security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050049
    P
    RHSA-2005:049: cups security update (Important)
    2005-02-01
    oval:com.redhat.rhsa:def:20050059
    P
    RHSA-2005:059: xpdf security update (Important)
    2005-01-26
    oval:org.debian:def:645
    V
    buffer overflow
    2005-01-19
    oval:org.debian:def:648
    V
    buffer overflow
    2005-01-19
    BACK
    xpdf xpdf 0.2
    xpdf xpdf 0.3
    xpdf xpdf 0.4
    xpdf xpdf 0.5
    xpdf xpdf 0.5a
    xpdf xpdf 0.6
    xpdf xpdf 0.7
    xpdf xpdf 0.7a
    xpdf xpdf 0.80
    xpdf xpdf 0.90
    xpdf xpdf 0.91
    xpdf xpdf 0.91a
    xpdf xpdf 0.91b
    xpdf xpdf 0.91c
    xpdf xpdf 0.92
    xpdf xpdf 0.92a
    xpdf xpdf 0.92b
    xpdf xpdf 0.92c
    xpdf xpdf 0.92d
    xpdf xpdf 0.92e
    xpdf xpdf 0.93
    xpdf xpdf 0.93a
    xpdf xpdf 0.93b
    xpdf xpdf 0.93c
    xpdf xpdf 1.0
    xpdf xpdf 1.0a
    xpdf xpdf 1.1
    xpdf xpdf 2.0
    xpdf xpdf 2.1
    xpdf xpdf 2.2
    xpdf xpdf 2.3
    xpdf xpdf 3.0
    kde kpdf *
    debian debian linux 3.0
    gentoo linux *
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1