CVE-2005-3193

MEDIUM

Description

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.

References

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt

ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U

ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U

ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U

http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html

http://rhn.redhat.com/errata/RHSA-2005-868.html

http://secunia.com/advisories/17897

http://secunia.com/advisories/17912

http://secunia.com/advisories/17916

http://secunia.com/advisories/17920

http://secunia.com/advisories/17926

http://secunia.com/advisories/17929

http://secunia.com/advisories/17940

http://secunia.com/advisories/17955

http://secunia.com/advisories/17956

http://secunia.com/advisories/17959

http://secunia.com/advisories/17976

http://secunia.com/advisories/18009

http://secunia.com/advisories/18055

http://secunia.com/advisories/18061

http://secunia.com/advisories/18147

http://secunia.com/advisories/18189

http://secunia.com/advisories/18191

http://secunia.com/advisories/18192

http://secunia.com/advisories/18303

http://secunia.com/advisories/18313

http://secunia.com/advisories/18336

http://secunia.com/advisories/18349

http://secunia.com/advisories/18380

http://secunia.com/advisories/18385

http://secunia.com/advisories/18387

http://secunia.com/advisories/18389

http://secunia.com/advisories/18398

http://secunia.com/advisories/18407

http://secunia.com/advisories/18416

http://secunia.com/advisories/18448

http://secunia.com/advisories/18517

http://secunia.com/advisories/18520

http://secunia.com/advisories/18534

http://secunia.com/advisories/18554

http://secunia.com/advisories/18582

http://secunia.com/advisories/18674

http://secunia.com/advisories/18675

http://secunia.com/advisories/18679

http://secunia.com/advisories/18908

http://secunia.com/advisories/18913

http://secunia.com/advisories/19125

http://secunia.com/advisories/19230

http://secunia.com/advisories/19377

http://secunia.com/advisories/19797

http://secunia.com/advisories/19798

http://secunia.com/advisories/25729

http://secunia.com/advisories/26413

http://securityreason.com/securityalert/236

http://securitytracker.com/id?1015309

http://securitytracker.com/id?1015324

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1

http://www.debian.org/security/2005/dsa-931

http://www.debian.org/security/2005/dsa-932

http://www.debian.org/security/2005/dsa-937

http://www.debian.org/security/2005/dsa-938

http://www.debian.org/security/2005/dsa-940

http://www.debian.org/security/2006/dsa-936

http://www.debian.org/security/2006/dsa-950

http://www.debian.org/security/2006/dsa-961

http://www.debian.org/security/2006/dsa-962

http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml

http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml

http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml

http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true

http://www.kde.org/info/security/advisory-20051207-1.txt

http://www.kde.org/info/security/advisory-20051207-2.txt

http://www.mandriva.com/security/advisories?name=MDKSA-2006:003

http://www.mandriva.com/security/advisories?name=MDKSA-2006:004

http://www.mandriva.com/security/advisories?name=MDKSA-2006:005

http://www.mandriva.com/security/advisories?name=MDKSA-2006:006

http://www.mandriva.com/security/advisories?name=MDKSA-2006:008

http://www.mandriva.com/security/advisories?name=MDKSA-2006:010

http://www.mandriva.com/security/advisories?name=MDKSA-2006:011

http://www.mandriva.com/security/advisories?name=MDKSA-2006:012

http://www.novell.com/linux/security/advisories/2005_29_sr.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html

http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html

http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html

http://www.redhat.com/support/errata/RHSA-2005-840.html

http://www.redhat.com/support/errata/RHSA-2005-867.html

http://www.redhat.com/support/errata/RHSA-2005-878.html

http://www.redhat.com/support/errata/RHSA-2006-0160.html

http://www.securityfocus.com/archive/1/418883/100/0/threaded

http://www.securityfocus.com/archive/1/427053/100/0/threaded

http://www.securityfocus.com/archive/1/427990/100/0/threaded

http://www.securityfocus.com/bid/15721

http://www.trustix.org/errata/2005/0072/

http://www.ubuntulinux.org/usn/usn-227-1

http://www.vupen.com/english/advisories/2005/2787

http://www.vupen.com/english/advisories/2005/2789

http://www.vupen.com/english/advisories/2005/2790

http://www.vupen.com/english/advisories/2005/2856

http://www.vupen.com/english/advisories/2007/2280

https://exchange.xforce.ibmcloud.com/vulnerabilities/23441

https://issues.rpath.com/browse/RPL-1609

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440

Details

Source: MITRE

Published: 2005-12-07

Updated: 2018-10-19

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 5.1

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 4.9

Severity: MEDIUM

Tenable Plugins

View all (44 total)

IDNameProductFamilySeverity
62252Fedora Core 4 : kdegraphics-3.5.0-0.2.fc4 (2005-037)NessusFedora Local Security Checks
medium
62249Fedora Core 4 : xpdf-3.01-0.FC4.6 (2005-027)NessusFedora Local Security Checks
medium
22828Debian DSA-962-1 : pdftohtml - buffer overflowsNessusDebian Local Security Checks
critical
22827Debian DSA-961-1 : pdfkit.framework - buffer overflowsNessusDebian Local Security Checks
critical
22816Debian DSA-950-1 : cupsys - buffer overflowsNessusDebian Local Security Checks
critical
22804Debian DSA-938-1 : koffice - buffer overflowsNessusDebian Local Security Checks
critical
22802Debian DSA-936-1 : libextractor - buffer overflowsNessusDebian Local Security Checks
critical
22798Debian DSA-932-1 : kdegraphics - buffer overflowsNessusDebian Local Security Checks
critical
22797Debian DSA-931-1 : xpdf - buffer overflowsNessusDebian Local Security Checks
critical
21972CentOS 4 : kdegraphics (CESA-2005:868)NessusCentOS Local Security Checks
critical
21971CentOS 4 : gpdf (CESA-2005:867)NessusCentOS Local Security Checks
high
21885CentOS 3 / 4 : tetex (CESA-2006:0160)NessusCentOS Local Security Checks
critical
21876CentOS 3 / 4 : cups (CESA-2005:878)NessusCentOS Local Security Checks
high
21873CentOS 3 / 4 : xpdf (CESA-2005:840)NessusCentOS Local Security Checks
critical
21583Slackware 10.2 / current : tetex PDF security (SSA:2006-142-01)NessusSlackware Local Security Checks
medium
21000GLSA-200603-02 : teTeX, pTeX, CSTeX: Multiple overflows in included XPdf codeNessusGentoo Local Security Checks
medium
20920Slackware 10.0 / 10.1 / 10.2 / 9.0 / 9.1 / current : xpdf (SSA:2006-045-09)NessusSlackware Local Security Checks
critical
20915Slackware 10.0 / 10.1 / 10.2 / current : kdegraphics (SSA:2006-045-04)NessusSlackware Local Security Checks
critical
20770Ubuntu 4.10 / 5.04 / 5.10 : xpdf/cupsys/tetex-bin/kdegraphics/koffice vulnerabilities (USN-227-1)NessusUbuntu Local Security Checks
high
20752RHEL 2.1 / 3 / 4 : tetex (RHSA-2006:0160)NessusRed Hat Local Security Checks
critical
20730Fedora Core 4 : kdegraphics-3.5.0-0.2.fc4 (2006-037)NessusFedora Local Security Checks
medium
20478Mandrake Linux Security Advisory : kdegraphics (MDKSA-2006:012)NessusMandriva Local Security Checks
critical
20477Mandrake Linux Security Advisory : tetex (MDKSA-2006:011)NessusMandriva Local Security Checks
critical
20476Mandrake Linux Security Advisory : cups (MDKSA-2006:010)NessusMandriva Local Security Checks
critical
20474Mandrake Linux Security Advisory : koffice (MDKSA-2006:008)NessusMandriva Local Security Checks
critical
20412GLSA-200601-02 : KPdf, KWord: Multiple overflows in included Xpdf codeNessusGentoo Local Security Checks
critical
20408Fedora Core 4 : xpdf-3.01-0.FC4.6 (2006-027)NessusFedora Local Security Checks
medium
20365RHEL 3 / 4 : cups (RHSA-2005:878)NessusRed Hat Local Security Checks
high
20363RHEL 4 : kdegraphics (RHSA-2005:868)NessusRed Hat Local Security Checks
critical
20362RHEL 4 : gpdf (RHSA-2005:867)NessusRed Hat Local Security Checks
high
20328GLSA-200512-08 : Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
20326Fedora Core 4 : poppler-0.4.3-1.3 (2005-1171)NessusFedora Local Security Checks
medium
20325Fedora Core 3 : xpdf-3.01-0.FC3.4 (2005-1170)NessusFedora Local Security Checks
medium
20324Fedora Core 4 : xpdf-3.01-0.FC4.5 (2005-1169)NessusFedora Local Security Checks
medium
20311Fedora Core 3 : gpdf-2.8.2-6.2 (2005-1146)NessusFedora Local Security Checks
medium
20308Fedora Core 4 : cups-1.1.23-15.2 (2005-1142)NessusFedora Local Security Checks
high
20307Fedora Core 3 : cups-1.1.22-0.rc1.8.8 (2005-1141)NessusFedora Local Security Checks
high
20291Fedora Core 4 : poppler-0.4.1-1.2 (2005-1132)NessusFedora Local Security Checks
medium
20279Fedora Core 3 : tetex-2.0.2-21.5 (2005-1127)NessusFedora Local Security Checks
high
20278Fedora Core 4 : tetex-3.0-7.FC4 (2005-1126)NessusFedora Local Security Checks
high
20277Fedora Core 3 : gpdf-2.8.2-5.2 (2005-1125)NessusFedora Local Security Checks
medium
20268RHEL 2.1 / 3 / 4 : xpdf (RHSA-2005:840)NessusRed Hat Local Security Checks
critical
20260Fedora Core 4 : xpdf-3.01-0.FC4.3 (2005-1122)NessusFedora Local Security Checks
medium
20259Fedora Core 3 : xpdf-3.01-0.FC3.3 (2005-1121)NessusFedora Local Security Checks
medium