Vulnerability Name:

CVE-2005-3628

Assigned:2005-12-06
Published:2005-12-06
Updated:2018-10-19
Summary:Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:ALLOWS_USER_ACCESS
References:Source: SGI
Type: UNKNOWN
20060201-01-U

Source: MITRE
Type: CNA
CVE-2005-3628

Source: SUSE
Type: Patch, Vendor Advisory
SUSE-SA:2006:001

Source: SECUNIA
Type: UNKNOWN
18147

Source: SECUNIA
Type: UNKNOWN
18380

Source: SECUNIA
Type: Patch, Vendor Advisory
18385

Source: SECUNIA
Type: Patch, Vendor Advisory
18387

Source: SECUNIA
Type: Patch, Vendor Advisory
18389

Source: SECUNIA
Type: Patch, Vendor Advisory
18398

Source: SECUNIA
Type: Patch, Vendor Advisory
18407

Source: SECUNIA
Type: Patch, Vendor Advisory
18416

Source: SECUNIA
Type: UNKNOWN
18428

Source: SECUNIA
Type: UNKNOWN
18436

Source: SECUNIA
Type: Patch, Vendor Advisory
18534

Source: SECUNIA
Type: Patch, Vendor Advisory
18582

Source: SECUNIA
Type: UNKNOWN
18674

Source: SECUNIA
Type: UNKNOWN
18675

Source: SECUNIA
Type: UNKNOWN
18679

Source: SECUNIA
Type: UNKNOWN
18908

Source: SECUNIA
Type: UNKNOWN
18913

Source: SECUNIA
Type: UNKNOWN
19230

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-045-09

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-045-04

Source: DEBIAN
Type: UNKNOWN
DSA-931

Source: DEBIAN
Type: UNKNOWN
DSA-932

Source: DEBIAN
Type: UNKNOWN
DSA-937

Source: DEBIAN
Type: UNKNOWN
DSA-938

Source: DEBIAN
Type: UNKNOWN
DSA-940

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-936

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-950

Source: DEBIAN
Type: UNKNOWN
DSA-961

Source: DEBIAN
Type: UNKNOWN
DSA-962

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2006:010

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:011

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:012

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2006:0160

Source: FEDORA
Type: UNKNOWN
FLSA-2006:176751

Source: FEDORA
Type: UNKNOWN
FLSA:175404

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10287

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xpdf:xpdf:*:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112129
    P
    cups-2.3.3op2-4.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105665
    P
    Security update for samba (Important)
    2021-11-16
    oval:org.mitre.oval:def:10287
    V
    Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
    2013-04-29
    oval:com.redhat.rhsa:def:20060160
    P
    RHSA-2006:0160: tetex security update (Moderate)
    2008-03-20
    oval:com.redhat.rhsa:def:20050868
    P
    RHSA-2005:868: kdegraphics security update (Important)
    2008-03-20
    oval:org.debian:def:961
    V
    buffer overflows
    2006-02-01
    oval:org.debian:def:962
    V
    buffer overflows
    2006-02-01
    oval:org.debian:def:950
    V
    buffer overflows
    2006-01-23
    oval:org.debian:def:940
    V
    buffer overflows
    2006-01-13
    oval:org.debian:def:937
    V
    buffer overflows
    2006-01-12
    oval:org.debian:def:938
    V
    buffer overflows
    2006-01-12
    oval:org.debian:def:936
    V
    buffer overflows
    2006-01-11
    oval:org.debian:def:931
    V
    buffer overflows
    2006-01-09
    oval:org.debian:def:932
    V
    buffer overflows
    2006-01-09
    oval:com.redhat.rhsa:def:20050840
    P
    RHSA-2005:840: xpdf security update (Important)
    2005-12-20
    oval:com.redhat.rhsa:def:20050867
    P
    RHSA-2005:867: gpdf security update (Important)
    2005-12-20
    oval:com.redhat.rhsa:def:20050878
    P
    RHSA-2005:878: cups security update (Important)
    2005-12-20
    BACK
    xpdf xpdf *