Vulnerability CVE-2005-3625


Published: 2005-12-31   Modified: 2012-02-12

Description:
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Type:

CWE-399

(Resource Management Errors)

Vendor: Turbolinux
Product: Turbolinux 
Version: fuji; 10;
Product: Turbolinux workstation 
Version: 8.0;
Product: Turbolinux server 
Version:
8.0
10.0_x86
10.0
Product: Turbolinux desktop 
Version: 10.0;
Product: Turbolinux appliance server 
Version: 1.0_workgroup_edition; 1.0_hosting_edition;
Product: Turbolinux multimedia 
Product: Turbolinux home 
Product: Turbolinux personal 
Vendor: Redhat
Product: Fedora core 
Version:
core_4.0
core_3.0
core_2.0
core_1.0
Product: Linux 
Version: 9.0; 7.3;
Product: Enterprise linux 
Version:
4.0
3.0
2.1
Product: Enterprise linux desktop 
Version: 4.0; 3.0;
Product: Linux advanced workstation 
Version: 2.1;
Vendor: SUSE
Product: Suse linux 
Version:
9.3
9.2
9.1
9.0
10.0
1.0
Vendor: Slackware
Product: Slackware linux 
Version:
9.1
9.0
10.2
10.1
10.0
Vendor: SCO
Product: Openserver 
Version: 6.0; 5.0.7;
Vendor: Ubuntu
Product: Ubuntu linux 
Version:
5.10
5.04
4.1
Vendor: KDE
Product: Kdegraphics 
Version: 3.4.3; 3.2;
Product: KPDF 
Version: 3.4.3; 3.2;
Product: Kword 
Version: 1.4.2;
Product: Koffice 
Version:
1.4.2
1.4.1
1.4
Vendor: Debian
Product: Debian linux 
Version: 3.1; 3.0;
Vendor: Mandrakesoft
Product: Mandrake linux corporate server 
Version: 3.0; 2.1;
Product: Mandrake linux 
Version:
2006
10.2
10.1
Vendor: Tetex
Product: Tetex 
Version:
3.0
2.0.2
2.0.1
2.0
1.0.7
Vendor: SGI
Product: Propack 
Version: 3.0;
Vendor: Trustix
Product: Secure linux 
Version:
3.0
2.2
2.0
Vendor: XPDF
Product: XPDF 
Version: 3.0;
Vendor: Conectiva
Product: Linux 
Version: 10.0;
Vendor: Easy software products
Product: CUPS 
Version:
1.1.23_rc1
1.1.23
1.1.22_rc1
1.1.22
Vendor: Poppler
Product: Poppler 
Version: 0.4.2;
Vendor: Libextractor
Product: Libextractor 
Vendor: Gentoo
Product: Linux 

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
http://rhn.redhat.com/errata/RHSA-2006-0177.html
http://scary.beasts.org/security/CESA-2005-003.txt
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
http://www.debian.org/security/2005/dsa-931
http://www.debian.org/security/2005/dsa-932
http://www.debian.org/security/2005/dsa-937
http://www.debian.org/security/2005/dsa-938
http://www.debian.org/security/2005/dsa-940
http://www.debian.org/security/2006/dsa-936
http://www.debian.org/security/2006/dsa-950
http://www.debian.org/security/2006/dsa-961
http://www.debian.org/security/2006/dsa-962
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
http://www.kde.org/info/security/advisory-20051207-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
http://www.redhat.com/support/errata/RHSA-2006-0160.html
http://www.redhat.com/support/errata/RHSA-2006-0163.html
http://www.securityfocus.com/archive/1/427053/100/0/threaded
http://www.securityfocus.com/archive/1/427990/100/0/threaded
http://www.securityfocus.com/bid/16143
http://www.trustix.org/errata/2006/0002/
http://www.vupen.com/english/advisories/2006/0047
http://www.vupen.com/english/advisories/2007/2280
https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
https://usn.ubuntu.com/236-1/

Related CVE
CVE-2017-14483
flower.initd in the Gentoo dev-python/flower package before 0.9.1-r1 for Celery Flower sets PID file ownership to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file...
CVE-2017-14484
The Gentoo sci-mathematics/gimps package before 28.10-r1 for Great Internet Mersenne Prime Search (GIMPS) allows local users to gain privileges by creating a hard link under /var/lib/gimps, because an unsafe "chown -R" command is executed.
CVE-2004-2778
Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or...
CVE-2014-9756
The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
CVE-2014-9622
Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
CVE-2014-9496
The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
CVE-2013-2100
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a craf...
CVE-2014-4909
Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bo...

Copyright 2019, cxsecurity.com

 

Back to Top