Podatność CVE-2005-3625


Publikacja: 2005-12-31   Modyfikacja: 2012-02-12

Opis:
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Typ:

CWE-399

(Resource Management Errors)

Producent: Turbolinux
Produkt: Turbolinux 
Wersje: fuji; 10;
Produkt: Turbolinux workstation 
Wersje: 8.0;
Produkt: Turbolinux server 
Wersje:
8.0
10.0_x86
10.0
Produkt: Turbolinux desktop 
Wersje: 10.0;
Produkt: Turbolinux appliance server 
Wersje: 1.0_workgroup_edition; 1.0_hosting_edition;
Produkt: Turbolinux multimedia 
Produkt: Turbolinux home 
Produkt: Turbolinux personal 
Producent: Redhat
Produkt: Fedora core 
Wersje:
core_4.0
core_3.0
core_2.0
core_1.0
Produkt: Linux 
Wersje: 9.0; 7.3;
Produkt: Enterprise linux 
Wersje:
4.0
3.0
2.1
Produkt: Enterprise linux desktop 
Wersje: 4.0; 3.0;
Produkt: Linux advanced workstation 
Wersje: 2.1;
Producent: SUSE
Produkt: Suse linux 
Wersje:
9.3
9.2
9.1
9.0
10.0
1.0
Producent: Slackware
Produkt: Slackware linux 
Wersje:
9.1
9.0
10.2
10.1
10.0
Producent: SCO
Produkt: Openserver 
Wersje: 6.0; 5.0.7;
Producent: Ubuntu
Produkt: Ubuntu linux 
Wersje:
5.10
5.04
4.1
Producent: KDE
Produkt: Kdegraphics 
Wersje: 3.4.3; 3.2;
Produkt: KPDF 
Wersje: 3.4.3; 3.2;
Produkt: Kword 
Wersje: 1.4.2;
Produkt: Koffice 
Wersje:
1.4.2
1.4.1
1.4
Producent: Debian
Produkt: Debian linux 
Wersje: 3.1; 3.0;
Producent: Mandrakesoft
Produkt: Mandrake linux corporate server 
Wersje: 3.0; 2.1;
Produkt: Mandrake linux 
Wersje:
2006
10.2
10.1
Producent: Tetex
Produkt: Tetex 
Wersje:
3.0
2.0.2
2.0.1
2.0
1.0.7
Producent: SGI
Produkt: Propack 
Wersje: 3.0;
Producent: Trustix
Produkt: Secure linux 
Wersje:
3.0
2.2
2.0
Producent: XPDF
Produkt: XPDF 
Wersje: 3.0;
Producent: Conectiva
Produkt: Linux 
Wersje: 10.0;
Producent: Easy software products
Produkt: CUPS 
Wersje:
1.1.23_rc1
1.1.23
1.1.22_rc1
1.1.22
Producent: Poppler
Produkt: Poppler 
Wersje: 0.4.2;
Producent: Libextractor
Produkt: Libextractor 
Producent: Gentoo
Produkt: Linux 

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
10/10
10/10
10/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Pełny
Pełny
Pełny

 Referencje:
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
http://rhn.redhat.com/errata/RHSA-2006-0177.html
http://scary.beasts.org/security/CESA-2005-003.txt
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
http://www.debian.org/security/2005/dsa-931
http://www.debian.org/security/2005/dsa-932
http://www.debian.org/security/2005/dsa-937
http://www.debian.org/security/2005/dsa-938
http://www.debian.org/security/2005/dsa-940
http://www.debian.org/security/2006/dsa-936
http://www.debian.org/security/2006/dsa-950
http://www.debian.org/security/2006/dsa-961
http://www.debian.org/security/2006/dsa-962
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
http://www.kde.org/info/security/advisory-20051207-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
http://www.redhat.com/support/errata/RHSA-2006-0160.html
http://www.redhat.com/support/errata/RHSA-2006-0163.html
http://www.securityfocus.com/archive/1/427053/100/0/threaded
http://www.securityfocus.com/archive/1/427990/100/0/threaded
http://www.securityfocus.com/bid/16143
http://www.trustix.org/errata/2006/0002/
http://www.vupen.com/english/advisories/2006/0047
http://www.vupen.com/english/advisories/2007/2280
https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
https://usn.ubuntu.com/236-1/

Podobne CVE
CVE-2017-14483
flower.initd in the Gentoo dev-python/flower package before 0.9.1-r1 for Celery Flower sets PID file ownership to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file...
CVE-2017-14484
The Gentoo sci-mathematics/gimps package before 28.10-r1 for Great Internet Mersenne Prime Search (GIMPS) allows local users to gain privileges by creating a hard link under /var/lib/gimps, because an unsafe "chown -R" command is executed.
CVE-2004-2778
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or...
CVE-2014-9756
The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
CVE-2014-9622
Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
CVE-2014-9496
The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
CVE-2013-2100
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a craf...
CVE-2014-4909
Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bo...

Copyright 2019, cxsecurity.com

 

Back to Top