Vulnerability Details : CVE-2005-3193
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-3193
Probability of exploitation activity in the next 30 days: 0.67%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3193
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
[email protected] |
CWE ids for CVE-2005-3193
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
Vendor statements for CVE-2005-3193
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23441
- http://www.kde.org/info/security/advisory-20051207-1.txt
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
- http://www.vupen.com/english/advisories/2007/2280
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.debian.org/security/2006/dsa-950
- http://www.debian.org/security/2006/dsa-962
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.securityfocus.com/archive/1/418883/100/0/threaded
- http://securitytracker.com/id?1015324
-
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html
- http://www.debian.org/security/2006/dsa-961
-
http://www.redhat.com/support/errata/RHSA-2005-840.html
Vendor Advisory
- https://issues.rpath.com/browse/RPL-1609
-
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html
- http://www.vupen.com/english/advisories/2005/2787
-
http://securityreason.com/securityalert/236
-
http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true
Patch;Vendor Advisory
- http://www.debian.org/security/2005/dsa-937
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
- http://rhn.redhat.com/errata/RHSA-2005-868.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.debian.org/security/2005/dsa-940
-
http://www.redhat.com/support/errata/RHSA-2006-0160.html
Vendor Advisory
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- http://www.debian.org/security/2006/dsa-936
-
http://www.redhat.com/support/errata/RHSA-2005-878.html
Vendor Advisory
- http://www.vupen.com/english/advisories/2005/2790
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://securitytracker.com/id?1015309
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://www.novell.com/linux/security/advisories/2005_29_sr.html
-
http://www.redhat.com/support/errata/RHSA-2005-867.html
Vendor Advisory
- http://www.kde.org/info/security/advisory-20051207-2.txt
-
http://www.securityfocus.com/bid/15721
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
- http://www.vupen.com/english/advisories/2005/2789
-
http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440
- http://www.trustix.org/errata/2005/0072/
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.vupen.com/english/advisories/2005/2856
-
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html
- http://www.debian.org/security/2005/dsa-938
-
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html
- http://www.ubuntulinux.org/usn/usn-227-1
- cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*