Vulnerability Details : CVE-2005-3191
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-3191
Probability of exploitation activity in the next 30 days: 0.61%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
nvd@nist.gov |
CWE ids for CVE-2005-3191
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2005-3191
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://www.kde.org/info/security/advisory-20051207-1.txt
- http://www.novell.com/linux/security/advisories/2006_02_sr.html
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
- http://www.vupen.com/english/advisories/2005/2788
- http://www.vupen.com/english/advisories/2007/2280
-
http://securityreason.com/securityalert/234
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
-
http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
Patch;Vendor Advisory
- http://www.debian.org/security/2006/dsa-950
- http://www.debian.org/security/2006/dsa-962
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.securityfocus.com/archive/1/418883/100/0/threaded
- http://securitytracker.com/id?1015324
- http://www.debian.org/security/2006/dsa-961
-
http://www.redhat.com/support/errata/RHSA-2005-840.html
Vendor Advisory
- https://issues.rpath.com/browse/RPL-1609
- http://www.vupen.com/english/advisories/2005/2787
- http://www.debian.org/security/2005/dsa-937
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
-
http://rhn.redhat.com/errata/RHSA-2005-868.html
Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.debian.org/security/2005/dsa-940
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- http://www.debian.org/security/2006/dsa-936
-
http://securityreason.com/securityalert/233
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
-
http://www.redhat.com/support/errata/RHSA-2005-878.html
Vendor Advisory
- http://www.vupen.com/english/advisories/2005/2790
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://securitytracker.com/id?1015309
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
-
http://www.securityfocus.com/bid/15726
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://www.novell.com/linux/security/advisories/2005_29_sr.html
-
http://www.redhat.com/support/errata/RHSA-2005-867.html
Vendor Advisory
- http://www.kde.org/info/security/advisory-20051207-2.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
- http://www.vupen.com/english/advisories/2005/2789
- http://www.trustix.org/errata/2005/0072/
-
http://www.securityfocus.com/bid/15727
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.vupen.com/english/advisories/2005/2856
- http://www.vupen.com/english/advisories/2005/2786
-
http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
Patch;Vendor Advisory
- http://www.debian.org/security/2005/dsa-938
- http://www.ubuntulinux.org/usn/usn-227-1
- cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*