Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-0064

Опубликовано: 02 мая 2005
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xpdffixed3.00-13package
gpdffixed2.8.2-1.2package
pdftohtmlfixed0.36-11package
kdegraphicsfixed4:3.3.2-2package
tetex-binfixed2.0.2-26package
cupsysfixed1.1.22-6package
cupsfixed1.1.22-6package

Примечания

  • cupsys switched to an xpdf-utils wrapper in version 1.1.22-6.

  • In version 1.1.23-13, the dormant code in the source

  • package was fixed.

EPSS

Процентиль: 92%
0.08395
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.

redhat
больше 20 лет назад

Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.

nvd
больше 20 лет назад

Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.

github
больше 3 лет назад

Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.

EPSS

Процентиль: 92%
0.08395
Низкий