Vulnerability Name: CVE-2005-3626 (CCN-24026) Assigned: 2005-12-31 Published: 2005-12-31 Updated: 2018-10-19 Summary: Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-399 Vulnerability Consequences: Denial of Service References: Source: SCO Type: UNKNOWNSCOSA-2006.15 Source: SGI Type: UNKNOWN20051201-01-U Source: SGI Type: UNKNOWN20060101-01-U Source: SGI Type: UNKNOWN20060201-01-U Source: MITRE Type: CNACVE-2005-3626 Source: SUSE Type: Patch, Vendor AdvisorySUSE-SA:2006:001 Source: CCN Type: RHSA-2005-840xpdf security update Source: CCN Type: RHSA-2005-868kdegraphics security update Source: CCN Type: RHSA-2006-0160tetex security update Source: CCN Type: RHSA-2006-0163cups security update Source: CCN Type: RHSA-2006-0177gpdf security update Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2006:0177 Source: CCN Type: Chris Evans Security Advisory CESA-2005-003 - rev 2xpdf (and derivatives) buffer and integer overflows Source: MISC Type: Exploithttp://scary.beasts.org/security/CESA-2005-003.txt Source: SECUNIA Type: UNKNOWN18147 Source: CCN Type: SA18303xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory18303 Source: CCN Type: SA18312Poppler Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory18312 Source: SECUNIA Type: Patch, Vendor Advisory18313 Source: CCN Type: SA18329teTeX Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory18329 Source: CCN Type: SA18332CUPS xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory18332 Source: SECUNIA Type: Patch, Vendor Advisory18334 Source: SECUNIA Type: Patch, Vendor Advisory18335 Source: SECUNIA Type: Patch, Vendor Advisory18338 Source: SECUNIA Type: Patch, Vendor Advisory18349 Source: SECUNIA Type: UNKNOWN18373 Source: CCN Type: SA18375GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory18375 Source: SECUNIA Type: UNKNOWN18380 Source: SECUNIA Type: Patch, Vendor Advisory18385 Source: SECUNIA Type: Patch, Vendor Advisory18387 Source: SECUNIA Type: Patch, Vendor Advisory18389 Source: CCN Type: SA18398libextractor Multiple Xpdf Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory18398 Source: SECUNIA Type: Patch, Vendor Advisory18407 Source: SECUNIA Type: UNKNOWN18414 Source: SECUNIA Type: Patch, Vendor Advisory18416 Source: SECUNIA Type: Patch, Vendor Advisory18423 Source: SECUNIA Type: UNKNOWN18425 Source: SECUNIA Type: UNKNOWN18428 Source: SECUNIA Type: UNKNOWN18436 Source: SECUNIA Type: Patch, Vendor Advisory18448 Source: SECUNIA Type: UNKNOWN18463 Source: SECUNIA Type: Patch, Vendor Advisory18517 Source: SECUNIA Type: Patch, Vendor Advisory18534 Source: SECUNIA Type: Patch, Vendor Advisory18554 Source: SECUNIA Type: Patch, Vendor Advisory18582 Source: CCN Type: SA18642pdftohtml xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory18642 Source: SECUNIA Type: Vendor Advisory18644 Source: CCN Type: SA18674GNUStep PDFKit Framework Xpdf Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory18674 Source: SECUNIA Type: Vendor Advisory18675 Source: SECUNIA Type: Vendor Advisory18679 Source: SECUNIA Type: UNKNOWN18908 Source: SECUNIA Type: UNKNOWN18913 Source: SECUNIA Type: UNKNOWN19230 Source: SECUNIA Type: UNKNOWN19377 Source: CCN Type: SA25729Sun Solaris Gnome PDF Viewer Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN25729 Source: SLACKWARE Type: UNKNOWNSSA:2006-045-09 Source: SLACKWARE Type: UNKNOWNSSA:2006-045-04 Source: CCN Type: Sun Alert ID: 102972Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code Source: SUNALERT Type: UNKNOWN102972 Source: CCN Type: ASA-2006-009cups security update (RHSA-2006-0163) Source: CCN Type: ASA-2006-012gpdf security update (RHSA-2006-0177) Source: CCN Type: ASA-2006-019tetex security update (RHSA-2006-0160) Source: CCN Type: ASA-2007-281Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code (SUN 102972) Source: DEBIAN Type: UNKNOWNDSA-931 Source: DEBIAN Type: UNKNOWNDSA-932 Source: DEBIAN Type: UNKNOWNDSA-937 Source: DEBIAN Type: UNKNOWNDSA-938 Source: DEBIAN Type: UNKNOWNDSA-940 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-936 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-950 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-961 Source: DEBIAN Type: UNKNOWNDSA-962 Source: DEBIAN Type: DSA-931xpdf -- buffer overflows Source: DEBIAN Type: DSA-932kdegraphics -- buffer overflows Source: DEBIAN Type: DSA-936libextractor -- buffer overflows Source: DEBIAN Type: DSA-937tetex-bin -- buffer overflows Source: DEBIAN Type: DSA-938koffice -- buffer overflows Source: DEBIAN Type: DSA-940gpdf -- buffer overflows Source: DEBIAN Type: DSA-950cupsys -- buffer overflows Source: DEBIAN Type: DSA-961pdfkit.framework -- buffer overflows Source: DEBIAN Type: DSA-962pdftohtml -- buffer overflows Source: CCN Type: GLSA-200601-02KPdf, KWord: Multiple overflows in included Xpdf code Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200601-02 Source: CCN Type: GLSA-200601-17Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows Source: GENTOO Type: UNKNOWNGLSA-200601-17 Source: CCN Type: KDE Security Advisory 20051207-2kpdf/xpdf multiple integer overflows Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.kde.org/info/security/advisory-20051207-2.txt Source: MANDRIVA Type: UNKNOWNMDKSA-2006:003 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:004 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:005 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:006 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:008 Source: MANDRAKE Type: UNKNOWNMDKSA-2006:010 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:011 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:012 Source: CONFIRM Type: Patchhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html Source: CONFIRM Type: Patchhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html Source: FEDORA Type: UNKNOWNFEDORA-2005-025 Source: FEDORA Type: UNKNOWNFEDORA-2005-026 Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2006:0160 Source: REDHAT Type: UNKNOWNRHSA-2006:0163 Source: FEDORA Type: UNKNOWNFLSA-2006:176751 Source: FEDORA Type: UNKNOWNFLSA:175404 Source: BID Type: Patch16143 Source: CCN Type: BID-16143KPDF and KWord Multiple Unspecified Buffer and Integer Overflow Vulnerabilities Source: TRUSTIX Type: UNKNOWN2006-0002 Source: CCN Type: TLSA-2006-2Multiple vulnerabilities exist in cups Source: CCN Type: USN-236-1xpdf vulnerabilities Source: CCN Type: USN-236-2xpdf vulnerabilities in kword Source: VUPEN Type: UNKNOWNADV-2006-0047 Source: VUPEN Type: UNKNOWNADV-2007-2280 Source: XF Type: UNKNOWNxpdf-flatedecode-dos(24026) Source: XF Type: UNKNOWNxpdf-flatedecode-dos(24026) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:9992 Source: UBUNTU Type: UNKNOWNUSN-236-1 Source: SUSE Type: SUSE-SA:2006:001xpdf various security problems Vulnerable Configuration: Configuration 1 :cpe:/a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:* OR cpe:/a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:* OR cpe:/a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:* OR cpe:/a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:* OR cpe:/a:kde:kdegraphics:3.2:*:*:*:*:*:*:* OR cpe:/a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:* OR cpe:/a:kde:koffice:1.4:*:*:*:*:*:*:* OR cpe:/a:kde:koffice:1.4.1:*:*:*:*:*:*:* OR cpe:/a:kde:koffice:1.4.2:*:*:*:*:*:*:* OR cpe:/a:kde:kpdf:3.2:*:*:*:*:*:*:* OR cpe:/a:kde:kpdf:3.4.3:*:*:*:*:*:*:* OR cpe:/a:kde:kword:1.4.2:*:*:*:*:*:*:* OR cpe:/a:libextractor:libextractor:*:*:*:*:*:*:*:* OR cpe:/a:poppler:poppler:0.4.2:*:*:*:*:*:*:* OR cpe:/a:sgi:propack:3.0:sp6:*:*:*:*:*:* OR cpe:/a:tetex:tetex:1.0.7:*:*:*:*:*:*:* OR cpe:/a:tetex:tetex:2.0:*:*:*:*:*:*:* OR cpe:/a:tetex:tetex:2.0.1:*:*:*:*:*:*:* OR cpe:/a:tetex:tetex:2.0.2:*:*:*:*:*:*:* OR cpe:/a:tetex:tetex:3.0:*:*:*:*:*:*:* OR cpe:/a:xpdf:xpdf:3.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:10.0:*:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:arm:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:mips:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:ppc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:s-390:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:sparc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:arm:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:mips:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:ppc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:s-390:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:sparc:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:* OR cpe:/o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:i386:*:*:*:*:* OR cpe:/o:redhat:linux:9.0:*:i386:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:sco:openserver:5.0.7:*:*:*:*:*:*:* OR cpe:/o:sco:openserver:6.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:1.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:personal:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:professional:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:s_390:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:personal:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:professional:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:personal:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:professional:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:personal:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:professional:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0:*:oss:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0:*:professional:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:10:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:10.0:*:*:*:desktop:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:8.0:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:10.0:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:10.0:*:*:*:server:*:x86:* OR cpe:/o:turbolinux:turbolinux:8.0:*:*:*:workstation:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:* OR cpe:/o:kde:kde:3.5:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
easy_software_products cups 1.1.22
easy_software_products cups 1.1.22_rc1
easy_software_products cups 1.1.23
easy_software_products cups 1.1.23_rc1
kde kdegraphics 3.2
kde kdegraphics 3.4.3
kde koffice 1.4
kde koffice 1.4.1
kde koffice 1.4.2
kde kpdf 3.2
kde kpdf 3.4.3
kde kword 1.4.2
libextractor libextractor *
poppler poppler 0.4.2
sgi propack 3.0 sp6
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
tetex tetex 3.0
xpdf xpdf 3.0
conectiva linux 10.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.0
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
debian debian linux 3.1
gentoo linux *
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 10.2
mandrakesoft mandrake linux 10.2
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 2.1
mandrakesoft mandrake linux corporate server 2.1
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3.0
redhat enterprise linux 3.0
redhat enterprise linux 3.0
redhat enterprise linux 4.0
redhat enterprise linux 4.0
redhat enterprise linux 4.0
redhat enterprise linux desktop 3.0
redhat enterprise linux desktop 4.0
redhat fedora core core_1.0
redhat fedora core core_2.0
redhat fedora core core_3.0
redhat fedora core core_4.0
redhat linux 7.3
redhat linux 9.0
redhat linux advanced workstation 2.1
redhat linux advanced workstation 2.1
sco openserver 5.0.7
sco openserver 6.0
slackware slackware linux 9.0
slackware slackware linux 9.1
slackware slackware linux 10.0
slackware slackware linux 10.1
slackware slackware linux 10.2
suse suse linux 1.0
suse suse linux 9.0
suse suse linux 9.0
suse suse linux 9.0
suse suse linux 9.0
suse suse linux 9.0
suse suse linux 9.1
suse suse linux 9.1
suse suse linux 9.1
suse suse linux 9.2
suse suse linux 9.2
suse suse linux 9.2
suse suse linux 9.3
suse suse linux 9.3
suse suse linux 9.3
suse suse linux 10.0
suse suse linux 10.0
trustix secure linux 2.0
trustix secure linux 2.2
trustix secure linux 3.0
turbolinux turbolinux 10
turbolinux turbolinux fuji
turbolinux turbolinux appliance server 1.0_hosting_edition
turbolinux turbolinux appliance server 1.0_workgroup_edition
turbolinux turbolinux desktop 10.0
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
turbolinux turbolinux personal *
turbolinux turbolinux server 8.0
turbolinux turbolinux server 10.0
turbolinux turbolinux server 10.0_x86
turbolinux turbolinux workstation 8.0
ubuntu ubuntu linux 4.1
ubuntu ubuntu linux 4.1
ubuntu ubuntu linux 5.04
ubuntu ubuntu linux 5.04
ubuntu ubuntu linux 5.04
ubuntu ubuntu linux 5.10
ubuntu ubuntu linux 5.10
ubuntu ubuntu linux 5.10
foolabs xpdf 3.01
kde kde 3.5
debian debian linux 3.0
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
sun solaris 10
sun solaris 10
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux fuji
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
mandrakesoft mandrake linux corporate server 2.1
suse suse linux 9.3