Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-3193

Опубликовано: 07 дек. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.1

Описание

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

3.5.2-0ubuntu6
devel

released

3.5.2-0ubuntu6
edgy

released

3.5.2-0ubuntu6
feisty

released

3.5.2-0ubuntu6
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.5.0-0ubuntu9.2
devel

released

1.6.3-0ubuntu5
edgy

released

1.5.2-0ubuntu2.2
feisty

released

1.6.2-0ubuntu1.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.36-13
devel

DNE

edgy

released

0.36-13
feisty

released

0.36-13
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.5.1-0ubuntu7.2
devel

released

0.6-0ubuntu1
edgy

released

0.5.4-0ubuntu4.2
feisty

released

0.5.4-0ubuntu8.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

3.0-13ubuntu6
devel

DNE

edgy

released

3.0-13ubuntu6
feisty

released

3.0-13ubuntu6
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

3.01-7ubuntu0.1
devel

released

3.01-9ubuntu3
edgy

released

3.01-9ubuntu1.1
feisty

released

3.01-9ubuntu3
upstream

needs-triage

Показывать по

EPSS

Процентиль: 86%
0.03031
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

redhat
почти 20 лет назад

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.

nvd
почти 20 лет назад

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.

debian
почти 20 лет назад

Heap-based buffer overflow in the JPXStream::readCodestream function i ...

github
больше 3 лет назад

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.

fstec
больше 19 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 86%
0.03031
Низкий

5.1 Medium

CVSS2