Vulnerability Name: | CVE-2005-3627 (CCN-24024) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2005-12-31 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2005-12-31 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: SCO Type: UNKNOWN SCOSA-2006.15 Source: SGI Type: UNKNOWN 20051201-01-U Source: SGI Type: UNKNOWN 20060101-01-U Source: SGI Type: UNKNOWN 20060201-01-U Source: MITRE Type: CNA CVE-2005-3627 Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:001 Source: CCN Type: RHSA-2005-840 xpdf security update Source: CCN Type: RHSA-2005-868 kdegraphics security update Source: CCN Type: RHSA-2006-0160 tetex security update Source: CCN Type: RHSA-2006-0163 cups security update Source: CCN Type: RHSA-2006-0177 gpdf security update Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0177 Source: CCN Type: Chris Evans Security Advisory CESA-2005-003 - rev 2 xpdf (and derivatives) buffer and integer overflows Source: MISC Type: Exploit, Vendor Advisory http://scary.beasts.org/security/CESA-2005-003.txt Source: SECUNIA Type: UNKNOWN 18147 Source: CCN Type: SA18303 xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 18303 Source: CCN Type: SA18312 Poppler Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 18312 Source: SECUNIA Type: Patch, Vendor Advisory 18313 Source: CCN Type: SA18329 teTeX Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18329 Source: CCN Type: SA18332 CUPS xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18332 Source: SECUNIA Type: Patch, Vendor Advisory 18334 Source: SECUNIA Type: Patch, Vendor Advisory 18335 Source: SECUNIA Type: Patch, Vendor Advisory 18338 Source: SECUNIA Type: Patch, Vendor Advisory 18349 Source: SECUNIA Type: UNKNOWN 18373 Source: CCN Type: SA18375 GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18375 Source: SECUNIA Type: UNKNOWN 18380 Source: SECUNIA Type: Patch, Vendor Advisory 18385 Source: SECUNIA Type: Patch, Vendor Advisory 18387 Source: SECUNIA Type: Patch, Vendor Advisory 18389 Source: CCN Type: SA18398 libextractor Multiple Xpdf Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 18398 Source: SECUNIA Type: Patch, Vendor Advisory 18407 Source: SECUNIA Type: UNKNOWN 18414 Source: SECUNIA Type: Patch, Vendor Advisory 18416 Source: SECUNIA Type: Patch, Vendor Advisory 18423 Source: SECUNIA Type: UNKNOWN 18425 Source: SECUNIA Type: UNKNOWN 18428 Source: SECUNIA Type: UNKNOWN 18436 Source: SECUNIA Type: Patch, Vendor Advisory 18448 Source: SECUNIA Type: UNKNOWN 18463 Source: SECUNIA Type: Patch, Vendor Advisory 18517 Source: SECUNIA Type: Patch, Vendor Advisory 18534 Source: SECUNIA Type: Patch, Vendor Advisory 18554 Source: SECUNIA Type: Patch, Vendor Advisory 18582 Source: CCN Type: SA18642 pdftohtml xpdf Multiple Integer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18642 Source: SECUNIA Type: Vendor Advisory 18644 Source: CCN Type: SA18674 GNUStep PDFKit Framework Xpdf Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18674 Source: SECUNIA Type: Vendor Advisory 18675 Source: SECUNIA Type: Vendor Advisory 18679 Source: SECUNIA Type: Vendor Advisory 18908 Source: SECUNIA Type: UNKNOWN 18913 Source: SECUNIA Type: UNKNOWN 19230 Source: SECUNIA Type: UNKNOWN 19377 Source: CCN Type: SA25729 Sun Solaris Gnome PDF Viewer Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 25729 Source: SLACKWARE Type: UNKNOWN SSA:2006-045-09 Source: SLACKWARE Type: UNKNOWN SSA:2006-045-04 Source: CCN Type: Sun Alert ID: 102972 Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code Source: SUNALERT Type: UNKNOWN 102972 Source: CCN Type: ASA-2006-009 cups security update (RHSA-2006-0163) Source: CCN Type: ASA-2006-012 gpdf security update (RHSA-2006-0177) Source: CCN Type: ASA-2006-019 tetex security update (RHSA-2006-0160) Source: CCN Type: ASA-2006-063 kdegraphics security update (RHSA-2006-0262) Source: CCN Type: ASA-2007-281 Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code (SUN 102972) Source: DEBIAN Type: UNKNOWN DSA-931 Source: DEBIAN Type: UNKNOWN DSA-932 Source: DEBIAN Type: UNKNOWN DSA-937 Source: DEBIAN Type: UNKNOWN DSA-938 Source: DEBIAN Type: UNKNOWN DSA-940 Source: DEBIAN Type: Patch, Vendor Advisory DSA-936 Source: DEBIAN Type: Patch, Vendor Advisory DSA-950 Source: DEBIAN Type: Patch, Vendor Advisory DSA-961 Source: DEBIAN Type: UNKNOWN DSA-962 Source: DEBIAN Type: DSA-1008 kdegraphics -- buffer overflow Source: DEBIAN Type: DSA-931 xpdf -- buffer overflows Source: DEBIAN Type: DSA-932 kdegraphics -- buffer overflows Source: DEBIAN Type: DSA-936 libextractor -- buffer overflows Source: DEBIAN Type: DSA-937 tetex-bin -- buffer overflows Source: DEBIAN Type: DSA-938 koffice -- buffer overflows Source: DEBIAN Type: DSA-940 gpdf -- buffer overflows Source: DEBIAN Type: DSA-950 cupsys -- buffer overflows Source: DEBIAN Type: DSA-961 pdfkit.framework -- buffer overflows Source: DEBIAN Type: DSA-962 pdftohtml -- buffer overflows Source: CCN Type: GLSA-200601-02 KPdf, KWord: Multiple overflows in included Xpdf code Source: GENTOO Type: Patch, Vendor Advisory GLSA-200601-02 Source: CCN Type: GLSA-200601-17 Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows Source: GENTOO Type: UNKNOWN GLSA-200601-17 Source: CCN Type: KDE Security Advisory 20051207-2 kpdf/xpdf multiple integer overflows Source: CONFIRM Type: Patch http://www.kde.org/info/security/advisory-20051207-2.txt Source: MANDRIVA Type: UNKNOWN MDKSA-2006:003 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:004 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:005 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:006 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:008 Source: MANDRAKE Type: UNKNOWN MDKSA-2006:010 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:011 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:012 Source: CONFIRM Type: Patch http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html Source: CONFIRM Type: Patch http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html Source: FEDORA Type: UNKNOWN FEDORA-2005-025 Source: FEDORA Type: UNKNOWN FEDORA-2005-026 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0160 Source: REDHAT Type: UNKNOWN RHSA-2006:0163 Source: FEDORA Type: UNKNOWN FLSA-2006:176751 Source: FEDORA Type: UNKNOWN FLSA:175404 Source: BID Type: Patch 16143 Source: CCN Type: BID-16143 KPDF and KWord Multiple Unspecified Buffer and Integer Overflow Vulnerabilities Source: TRUSTIX Type: UNKNOWN 2006-0002 Source: CCN Type: TLSA-2006-2 Multiple vulnerabilities exist in cups Source: CCN Type: USN-236-1 xpdf vulnerabilities Source: CCN Type: USN-236-2 xpdf vulnerabilities in kword Source: VUPEN Type: UNKNOWN ADV-2006-0047 Source: VUPEN Type: UNKNOWN ADV-2007-2280 Source: XF Type: UNKNOWN xpdf-readhuffmantables-bo(24024) Source: XF Type: UNKNOWN xpdf-readhuffmantables-bo(24024) Source: XF Type: UNKNOWN xpdf-readscaninfo-bo(24025) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10200 Source: UBUNTU Type: UNKNOWN USN-236-1 Source: SUSE Type: SUSE-SA:2006:001 xpdf various security problems | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2005-3627 (CCN-24025) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2005-11-16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2006-01-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2006-01-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-3627 Source: CCN Type: RHSA-2005-840 xpdf security update Source: CCN Type: RHSA-2005-868 kdegraphics security update Source: CCN Type: RHSA-2006-0160 tetex security update Source: CCN Type: RHSA-2006-0163 cups security update Source: CCN Type: RHSA-2006-0177 gpdf security update Source: CCN Type: Chris Evans Security Advisory CESA-2005-003 - rev 2 xpdf (and derivatives) buffer and integer overflows Source: CCN Type: SA18303 xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18312 Poppler Xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18329 teTeX Xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18332 CUPS xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18375 GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18398 libextractor Multiple Xpdf Vulnerabilities Source: CCN Type: SA18642 pdftohtml xpdf Multiple Integer Overflow Vulnerabilities Source: CCN Type: SA18674 GNUStep PDFKit Framework Xpdf Multiple Vulnerabilities Source: CCN Type: SA25729 Sun Solaris Gnome PDF Viewer Multiple Vulnerabilities Source: CCN Type: Sun Alert ID: 102972 Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code Source: CCN Type: ASA-2006-009 cups security update (RHSA-2006-0163) Source: CCN Type: ASA-2006-012 gpdf security update (RHSA-2006-0177) Source: CCN Type: ASA-2006-019 tetex security update (RHSA-2006-0160) Source: CCN Type: ASA-2006-063 kdegraphics security update (RHSA-2006-0262) Source: CCN Type: ASA-2007-281 Multiple Security Vulnerabilities in the Solaris Gnome PDF Viewer (gpdf(1)) may Allow a Denial of Service (DoS) Condition or Lead to Execution of Arbitrary Code (SUN 102972) Source: DEBIAN Type: DSA-1008 kdegraphics -- buffer overflow Source: DEBIAN Type: DSA-931 xpdf -- buffer overflows Source: DEBIAN Type: DSA-932 kdegraphics -- buffer overflows Source: DEBIAN Type: DSA-936 libextractor -- buffer overflows Source: DEBIAN Type: DSA-937 tetex-bin -- buffer overflows Source: DEBIAN Type: DSA-938 koffice -- buffer overflows Source: DEBIAN Type: DSA-940 gpdf -- buffer overflows Source: DEBIAN Type: DSA-950 cupsys -- buffer overflows Source: DEBIAN Type: DSA-961 pdfkit.framework -- buffer overflows Source: DEBIAN Type: DSA-962 pdftohtml -- buffer overflows Source: CCN Type: GLSA-200601-02 KPdf, KWord: Multiple overflows in included Xpdf code Source: CCN Type: GLSA-200601-17 Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows Source: CCN Type: KDE Security Advisory 20051207-2 kpdf/xpdf multiple integer overflows Source: CCN Type: BID-16143 KPDF and KWord Multiple Unspecified Buffer and Integer Overflow Vulnerabilities Source: CCN Type: TLSA-2006-2 Multiple vulnerabilities exist in cups Source: CCN Type: USN-236-1 xpdf vulnerabilities Source: CCN Type: USN-236-2 xpdf vulnerabilities in kword Source: XF Type: UNKNOWN xpdf-readscaninfo-bo(24025) Source: SUSE Type: SUSE-SA:2006:001 xpdf various security problems | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |