Vulnerability Details : CVE-2006-1244
Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc. NOTE: this description is based on Debian advisory DSA 979, which is based on changes that were made after other vulnerabilities such as CVE-2006-0301 and CVE-2005-3624 through CVE-2005-3628 were fixed. Some of these newer fixes appear to be security-relevant, although it is not clear if they fix specific issues or are defensive in nature.
Products affected by CVE-2006-1244
- cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
- cpe:2.3:a:gnome:gpdf:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:libextractor:libextractor:0.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1244
3.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1244
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
References for CVE-2006-1244
-
http://secunia.com/advisories/19091
Patch;Vendor Advisory
-
http://www.debian.org/security/2006/dsa-979
Patch;Vendor Advisory
-
http://secunia.com/advisories/19065
Patch;Vendor Advisory
-
http://www.debian.org/security/2006/dsa-998
Patch;Vendor Advisory
-
http://secunia.com/advisories/19164
Patch;Vendor Advisory
-
http://www.debian.org/security/2006/dsa-982
Patch;Vendor Advisory
-
http://secunia.com/advisories/19021
Patch;Vendor Advisory
-
http://www.debian.org/security/2006/dsa-984
Patch;Vendor Advisory
-
http://secunia.com/advisories/19364
Patch;Vendor Advisory
-
http://www.osvdb.org/23834
-
http://www.debian.org/security/2006/dsa-983
Patch;Vendor Advisory
-
http://secunia.com/advisories/19644
Patch;Vendor Advisory
-
http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3.diff.gz
Patch
-
https://usn.ubuntu.com/270-1/
-
http://www.debian.org/security/2006/dsa-1019
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/16748
-
http://secunia.com/advisories/18948
Patch;Vendor Advisory
Jump to