Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3628

Опубликовано: 31 дек. 2005
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kdegraphicsfixed4:3.5.0-3package
gpdffixed2.10.0-2package
xpdffixed3.01-4package
kofficefixed1:1.4.2-6package
libextractorfixed0.5.9-1package
pdfkit.frameworkfixed0.8-4package
pdftohtmlfixed0.36-12package
cupsysfixed1.1.22-7package
cupsfixed1.1.22-7package
tetex-binfixed3.0-12package

Примечания

  • cupsys switched to an external PDF implementation in 1.1.22-7.

  • tetex-bin switched to poppler in 3.0-12.

EPSS

Процентиль: 85%
0.02683
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.

redhat
больше 19 лет назад

Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.

nvd
больше 19 лет назад

Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.

github
больше 3 лет назад

Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.

fstec
больше 19 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 85%
0.02683
Низкий