Vulnerability Details : CVE-2005-0064
Potential exploit
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
Vulnerability category: OverflowExecute code
Products affected by CVE-2005-0064
- cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0064
11.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0064
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-0064
-
http://www.redhat.com/support/errata/RHSA-2005-026.html
Support
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:019
Mandriva
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:020
Mandriva
-
https://security.gentoo.org/glsa/200502-10
pdftohtml: Vulnerabilities in included Xpdf (GLSA 200502-10) — Gentoo security
-
http://www.redhat.com/support/errata/RHSA-2005-057.html
SupportPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-034.html
SupportPatch;Vendor Advisory
-
http://www.trustix.org/errata/2005/0003/
Trustix | Empowering Trust and Security in the Digital AgePatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:021
Mandriva
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:017
Mandriva
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=110625368019554&w=2
'[USN-64-1] xpdf, CUPS vulnerabilities' - MARC
-
http://www.redhat.com/support/errata/RHSA-2005-066.html
SupportPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-053.html
SupportPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:016
Mandriva
-
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch
Patch
-
https://bugzilla.fedora.us/show_bug.cgi?id=2353
Patch;Vendor Advisory
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
-
http://www.debian.org/security/2005/dsa-648
[SECURITY] [DSA 648-1] New xpdf packages fix arbitrary code executionPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:018
Mandriva
-
http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities
U.S. | Let There Be Change | AccentureExploit;Patch;Vendor Advisory
-
https://security.gentoo.org/glsa/200501-28
Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2 (GLSA 200501-28) — Gentoo security
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781
404 Not Found
-
http://www.debian.org/security/2005/dsa-645
[SECURITY] [DSA 645-1] New CUPS packages fix arbitrary code executionPatch;Vendor Advisory
-
https://bugzilla.fedora.us/show_bug.cgi?id=2352
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-059.html
SupportPatch;Vendor Advisory
Jump to