CVE-2005-3627

Summary

CVECVE-2005-3627
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2005-12-31 05:00:00 UTC
Updated2018-10-19 15:37:00 UTC
DescriptionStream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

Risk And Classification

Problem Types: CWE-119 | NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Xpdf Xpdf All All All All
Application Xpdf Xpdf All All All All

References

ReferenceSourceLinkTags
Gentoo Linux Documentation -- Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows GENTOO www.gentoo.org
USN-236-1: xpdf vulnerabilities | Ubuntu security notices UBUNTU usn.ubuntu.com
Secunia - Advisories - Debian update for pdfkit.framework SECUNIA secunia.com Vendor Advisory
[SECURITY] Fedora Core 3 Update: cups-1.1.22-0.rc1.8.9 CONFIRM www.redhat.com Patch
SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia SECUNIA secunia.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
[SECURITY] Fedora Core 4 Update: poppler-0.4.4-1.1 FEDORA www.redhat.com
Secunia - Advisories - Debian update for tetex-bin SECUNIA secunia.com
Webmail - OVH VUPEN www.vupen.com
Debian -- Security Information -- DSA-936-1 libextractor DEBIAN www.debian.org Patch, Vendor Advisory
Webmail - OVH VUPEN www.vupen.com
Secunia - Advisories - Mandriva update for cups SECUNIA secunia.com Patch, Vendor Advisory
SecurityFocus FEDORA www.securityfocus.com
Secunia - Advisories - Gentoo updates for xpdf/poppler/gpdf/libextractor/pdftohtml SECUNIA secunia.com Vendor Advisory
Secunia - Advisories - Ubuntu updates for cupsys / libpoppler0c2 / tetex-bin / xpdf-reader / xpdf-utils SECUNIA secunia.com Patch, Vendor Advisory
Debian -- Page not found DEBIAN www.debian.org
Secunia - Advisories - xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Patch, Vendor Advisory
Repository / Oval Repository OVAL oval.cisecurity.org
SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: xpdf,kpdf,gpdf,kword (SUSE-SA:2006:001) SUSE lists.suse.com Patch, Vendor Advisory
Debian -- Security Information -- DSA-962-1 pdftohtml DEBIAN www.debian.org
Advisories - Mandriva Linux MANDRIVA www.mandriva.com
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com Patch, Vendor Advisory
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Secunia - Advisories - Fedora update for cups SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - Slackware update for xpdf SECUNIA secunia.com Vendor Advisory
Advisories - Mandriva Linux OS MANDRAKE www.mandriva.com
20060201-01-U SGI patches.sgi.com
Secunia - Advisories - SGI Advanced Linux Environment Multiple Updates SECUNIA secunia.com Patch, Vendor Advisory
20051201-01-U SGI patches.sgi.com
Secunia - Advisories - Red Hat update for gpdf SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - teTeX Xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Vendor Advisory
Secunia - Advisories - Fedora update for gpdf SECUNIA secunia.com
20060101-01-U SGI patches.sgi.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
Secunia - Advisories - Debian update for libextractor SECUNIA secunia.com Patch, Vendor Advisory
Sun Solaris Gnome PDF Viewer Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
Debian -- Page not found DEBIAN www.debian.org
Debian -- Page not found DEBIAN www.debian.org
Gentoo Linux Documentation -- KPdf, KWord: Multiple overflows in included Xpdf code GENTOO www.gentoo.org Patch, Vendor Advisory
Secunia - Advisories - Debian update for kpdf SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - SGI Advanced Linux Environment Multiple Updates SECUNIA secunia.com Patch, Vendor Advisory
[SECURITY] Fedora Core 4 Update: cups-1.1.23-15.3 CONFIRM www.redhat.com Patch
Secunia - Advisories - Fedora update for poppler SECUNIA secunia.com
Secunia - Advisories - Ubuntu update for kpdf / kword SECUNIA secunia.com Patch, Vendor Advisory
The Slackware Linux Project: Slackware Security Advisories SLACKWARE slackware.com
[SECURITY] Fedora Core 3 Update: gpdf-2.8.2-7.2 FEDORA www.redhat.com
KPDF and KWord Multiple Unspecified Buffer and Integer Overflow Vulnerabilities BID www.securityfocus.com Patch
Debian -- Page not found DEBIAN www.debian.org
Secunia - Advisories - Debian update for koffice SECUNIA secunia.com
Secunia - Advisories - Gentoo update for kdegraphics / kpdf / koffice / kword SECUNIA secunia.com Patch, Vendor Advisory
102972 SUNALERT sunsolve.sun.com
www.kde.org/info/security/advisory-20051207-2.txt CONFIRM www.kde.org Patch
Debian -- Page not found DEBIAN www.debian.org
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
The Slackware Linux Project: Slackware Security Advisories SLACKWARE slackware.com
Advisories - Mandriva Linux OS MANDRIVA www.mandriva.com
Secunia - Advisories - libextractor Multiple Xpdf Vulnerabilities SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - SUSE updates for xpdf / kpdf / gpdf / kword SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - CUPS xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Vendor Advisory
Secunia - Advisories - pdftohtml xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Vendor Advisory
Secunia - Advisories - Debian update for pdftohtml SECUNIA secunia.com Vendor Advisory
Debian -- Security Information -- DSA-961-1 pdfkit.framework DEBIAN www.debian.org Patch, Vendor Advisory
Secunia - Advisories - Red Hat update for tetex SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - Debian update for cupsys SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - Slackware update for kdegraphics SECUNIA secunia.com
Secunia - Advisories - Mandriva update for xpdf SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - GNUStep PDFKit Framework Xpdf Multiple Vulnerabilities SECUNIA secunia.com Vendor Advisory
Secunia - Advisories - Debian update for xpdf SECUNIA secunia.com Patch, Vendor Advisory
SCOSA-2006.15 SCO ftp.sco.com
SecurityFocus FEDORA www.securityfocus.com
Secunia - Advisories - Red Hat update for cups SECUNIA secunia.com
rhn.redhat.com | Red Hat Support REDHAT rhn.redhat.com Patch, Vendor Advisory
Secunia - Advisories - Mandriva update for tetex SECUNIA secunia.com
Debian -- Security Information -- DSA-950-1 cupsys DEBIAN www.debian.org Patch, Vendor Advisory
Trustix update for multiple packages - Advisories - Secunia SECUNIA secunia.com
scary.beasts.org/security/CESA-2005-003.txt MISC scary.beasts.org Exploit, Vendor Advisory
Secunia - Advisories - Poppler Xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Patch, Vendor Advisory
Secunia - Advisories - Debian update for gpdf SECUNIA secunia.com
2006-0002 TRUSTIX www.trustix.org
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Secunia - Advisories - Fedora update for tetex SECUNIA secunia.com Patch, Vendor Advisory
SCO OpenServer update for xpdf - Advisories - Secunia SECUNIA secunia.com
Secunia - Advisories - GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities SECUNIA secunia.com Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2007-03-14Mark J CoxRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report