Vulnerability Details : CVE-2005-0064
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-0064
Probability of exploitation activity in the next 30 days: 16.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-0064
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
nvd@nist.gov |
References for CVE-2005-0064
- http://www.redhat.com/support/errata/RHSA-2005-026.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:019
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:020
-
https://security.gentoo.org/glsa/200502-10
-
http://www.redhat.com/support/errata/RHSA-2005-057.html
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-034.html
Patch;Vendor Advisory
-
http://www.trustix.org/errata/2005/0003/
Trustix | Empowering Trust and Security in the Digital AgePatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:021
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:017
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=110625368019554&w=2
-
http://www.redhat.com/support/errata/RHSA-2005-066.html
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-053.html
Patch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:016
-
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch
Patch
-
https://bugzilla.fedora.us/show_bug.cgi?id=2353
Patch;Vendor Advisory
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
-
http://www.debian.org/security/2005/dsa-648
Patch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:018
-
http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities
Exploit;Patch;Vendor Advisory
-
https://security.gentoo.org/glsa/200501-28
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781
-
http://www.debian.org/security/2005/dsa-645
Patch;Vendor Advisory
-
https://bugzilla.fedora.us/show_bug.cgi?id=2352
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-059.html
Patch;Vendor Advisory
Products affected by CVE-2005-0064
- cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*