Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-3627

Опубликовано: 31 дек. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

РелизСтатусПримечание
dapper

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.10.0-2
devel

DNE

edgy

released

2.10.0-2
feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

3.5.2-0ubuntu6
devel

released

3.5.2-0ubuntu6
edgy

released

3.5.2-0ubuntu6
feisty

released

3.5.2-0ubuntu6
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.5.0-0ubuntu9.2
devel

released

1.6.3-0ubuntu5
edgy

released

1.5.2-0ubuntu2.2
feisty

released

1.6.2-0ubuntu1.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.5.1-0ubuntu7.2
devel

released

0.6-0ubuntu1
edgy

released

0.5.4-0ubuntu4.2
feisty

released

0.5.4-0ubuntu8.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 88%
0.04327
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

nvd
больше 19 лет назад

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

debian
больше 19 лет назад

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, ...

github
больше 3 лет назад

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

fstec
больше 19 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 88%
0.04327
Низкий

7.5 High

CVSS2