{"api_version":"1","generated_at":"2026-04-22T19:34:58+00:00","cve":"CVE-2005-3625","urls":{"html":"https://cve.report/CVE-2005-3625","api":"https://cve.report/api/cve/CVE-2005-3625.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3625","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3625"},"summary":{"title":"CVE-2005-3625","description":"Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"","state":"PUBLISHED","assigner":"redhat","published_at":"2005-12-31 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-399","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18338","name":"http://secunia.com/advisories/18338","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Ubuntu update for kpdf / kword","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18147","name":"http://secunia.com/advisories/18147","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Debian update for koffice","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","name":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora Core 3 Update: gpdf-2.8.2-7.2","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18373","name":"http://secunia.com/advisories/18373","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Fedora update for poppler","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18675","name":"http://secunia.com/advisories/18675","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Debian update for pdftohtml","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18425","name":"http://secunia.com/advisories/18425","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Red Hat update for cups","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18313","name":"http://secunia.com/advisories/18313","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Gentoo update for kdegraphics / kpdf / koffice / kword","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18389","name":"http://secunia.com/advisories/18389","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Debian update for kpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html","name":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"[SECURITY] Fedora Core 4 Update: cups-1.1.23-15.3","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://scary.beasts.org/security/CESA-2005-003.txt","name":"http://scary.beasts.org/security/CESA-2005-003.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2005/dsa-938","name":"http://www.debian.org/security/2005/dsa-938","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Page not found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.debian.org/security/2006/dsa-936","name":"http://www.debian.org/security/2006/dsa-936","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Debian -- Security Information -- DSA-936-1 libextractor","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/236-1/","name":"https://usn.ubuntu.com/236-1/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-236-1: xpdf vulnerabilities | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","name":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18349","name":"http://secunia.com/advisories/18349","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Mandriva update for xpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","name":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/19377","name":"http://secunia.com/advisories/19377","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SCO OpenServer update for xpdf - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","name":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/18913","name":"http://secunia.com/advisories/18913","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Slackware update for kdegraphics","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","name":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/18398","name":"http://secunia.com/advisories/18398","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - libextractor Multiple Xpdf Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18385","name":"http://secunia.com/advisories/18385","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Debian update for xpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2005/dsa-937","name":"http://www.debian.org/security/2005/dsa-937","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Page not found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","name":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora Core 4 Update: poppler-0.4.4-1.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","name":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-950","name":"http://www.debian.org/security/2006/dsa-950","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Debian -- Security Information -- DSA-950-1 cupsys","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2005/dsa-931","name":"http://www.debian.org/security/2005/dsa-931","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Page not found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/18679","name":"http://secunia.com/advisories/18679","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Debian update for pdfkit.framework","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kde.org/info/security/advisory-20051207-2.txt","name":"http://www.kde.org/info/security/advisory-20051207-2.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/16143","name":"http://www.securityfocus.com/bid/16143","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"KPDF and KWord Multiple Unspecified Buffer and Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/18329","name":"http://secunia.com/advisories/18329","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - teTeX Xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18334","name":"http://secunia.com/advisories/18334","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Ubuntu updates for cupsys / libpoppler0c2 / tetex-bin / xpdf-reader / xpdf-utils","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","name":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"The Slackware Linux Project: Slackware Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trustix.org/errata/2006/0002/","name":"http://www.trustix.org/errata/2006/0002/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html","name":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"[SECURITY] Fedora Core 3 Update: cups-1.1.22-0.rc1.8.9","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/0047","name":"http://www.vupen.com/english/advisories/2006/0047","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18644","name":"http://secunia.com/advisories/18644","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Gentoo updates for xpdf/poppler/gpdf/libextractor/pdftohtml","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18414","name":"http://secunia.com/advisories/18414","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Fedora update for gpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2005/dsa-932","name":"http://www.debian.org/security/2005/dsa-932","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Page not found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/25729","name":"http://secunia.com/advisories/25729","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Sun Solaris Gnome PDF Viewer Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18416","name":"http://secunia.com/advisories/18416","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - SUSE updates for xpdf / kpdf / gpdf / kword","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18582","name":"http://secunia.com/advisories/18582","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Debian update for cupsys","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2005/dsa-940","name":"http://www.debian.org/security/2005/dsa-940","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Page not found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/18674","name":"http://secunia.com/advisories/18674","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - GNUStep PDFKit Framework Xpdf Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Gentoo Linux Documentation\n--\n  KPdf, KWord: Multiple overflows in included Xpdf code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18908","name":"http://secunia.com/advisories/18908","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Slackware update for xpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18436","name":"http://secunia.com/advisories/18436","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Debian update for gpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18517","name":"http://secunia.com/advisories/18517","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - SGI Advanced Linux Environment Multiple Updates","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/2280","name":"http://www.vupen.com/english/advisories/2007/2280","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18332","name":"http://secunia.com/advisories/18332","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - CUPS xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19230","name":"http://secunia.com/advisories/19230","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18387","name":"http://secunia.com/advisories/18387","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Mandriva update for cups","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","name":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18642","name":"http://secunia.com/advisories/18642","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - pdftohtml xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","name":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: xpdf,kpdf,gpdf,kword  (SUSE-SA:2006:001)","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/18312","name":"http://secunia.com/advisories/18312","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Poppler Xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","name":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18303","name":"http://secunia.com/advisories/18303","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18375","name":"http://secunia.com/advisories/18375","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-961","name":"http://www.debian.org/security/2006/dsa-961","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Debian -- Security Information -- DSA-961-1 pdfkit.framework","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/18448","name":"http://secunia.com/advisories/18448","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Fedora update for tetex","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18423","name":"http://secunia.com/advisories/18423","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Red Hat update for gpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18554","name":"http://secunia.com/advisories/18554","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - SGI Advanced Linux Environment Multiple Updates","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","name":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"The Slackware Linux Project: Slackware Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-962","name":"http://www.debian.org/security/2006/dsa-962","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-962-1 pdftohtml","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18335","name":"http://secunia.com/advisories/18335","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Fedora update for cups","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18534","name":"http://secunia.com/advisories/18534","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Red Hat update for tetex","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18463","name":"http://secunia.com/advisories/18463","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Trustix update for multiple packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18380","name":"http://secunia.com/advisories/18380","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Mandriva update for tetex","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18407","name":"http://secunia.com/advisories/18407","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Debian update for libextractor","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux OS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18428","name":"http://secunia.com/advisories/18428","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Debian update for tetex-bin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","name":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","name":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3625","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3625","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"conectiva","cpe5":"linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"alpha","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"arm","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"hppa","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ia-32","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ia-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"m68k","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"mips","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"mipsel","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ppc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"s-390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"sparc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"alpha","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"amd64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"arm","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"hppa","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"ia-32","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"ia-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"m68k","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"mips","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"mipsel","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"ppc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"s-390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"sparc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.22_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.23","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.23_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"gentoo","cpe5":"linux","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kdegraphics","cpe6":"3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kdegraphics","cpe6":"3.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kpdf","cpe6":"3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kpdf","cpe6":"3.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kword","cpe6":"1.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libextractor","cpe5":"libextractor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.1","cpe7":"*","cpe8":"x86-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.2","cpe7":"*","cpe8":"x86-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"2006","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"2006","cpe7":"*","cpe8":"x86-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux_corporate_server","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux_corporate_server","cpe6":"2.1","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux_corporate_server","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux_corporate_server","cpe6":"3.0","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"poppler","cpe5":"poppler","cpe6":"0.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"workstation_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"workstation","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux","cpe6":"7.3","cpe7":"*","cpe8":"i386","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux","cpe6":"9.0","cpe7":"*","cpe8":"i386","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"itanium","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sco","cpe5":"openserver","cpe6":"5.0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sco","cpe5":"openserver","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sgi","cpe5":"propack","cpe6":"3.0","cpe7":"sp6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"slackware","cpe5":"slackware_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"slackware","cpe5":"slackware_linux","cpe6":"10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"slackware","cpe5":"slackware_linux","cpe6":"10.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"slackware","cpe5":"slackware_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"slackware","cpe5":"slackware_linux","cpe6":"9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"10.0","cpe7":"*","cpe8":"oss","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"10.0","cpe7":"*","cpe8":"professional","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"personal","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"professional","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"s_390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.1","cpe7":"*","cpe8":"personal","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.1","cpe7":"*","cpe8":"professional","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.1","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.2","cpe7":"*","cpe8":"personal","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.2","cpe7":"*","cpe8":"professional","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.2","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.3","cpe7":"*","cpe8":"personal","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.3","cpe7":"*","cpe8":"professional","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.3","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"1.0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux","cpe6":"fuji","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_appliance_server","cpe6":"1.0_hosting_edition","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_appliance_server","cpe6":"1.0_workgroup_edition","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_desktop","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_home","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_multimedia","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_personal","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_server","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_server","cpe6":"10.0_x86","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_server","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"turbolinux","cpe5":"turbolinux_workstation","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"4.1","cpe7":"*","cpe8":"ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"4.1","cpe7":"*","cpe8":"ppc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.04","cpe7":"*","cpe8":"amd64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.04","cpe7":"*","cpe8":"i386","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.04","cpe7":"*","cpe8":"powerpc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.10","cpe7":"*","cpe8":"amd64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.10","cpe7":"*","cpe8":"i386","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"5.10","cpe7":"*","cpe8":"powerpc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2005-3625","organization":"Red Hat","lastmodified":"2007-03-14","contributor":"Mark J Cox","statementText":"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.","cve_year":"2005","cve_id":"3625","crc32":"e4ada83e"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T23:17:23.366Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"16143","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/16143"},{"name":"DSA-932","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-932"},{"name":"18349","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18349"},{"name":"oval:org.mitre.oval:def:9575","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575"},{"name":"18147","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18147"},{"name":"SCOSA-2006.15","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"name":"18679","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18679"},{"name":"18312","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18312"},{"name":"18644","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18644"},{"name":"USN-236-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/236-1/"},{"name":"18425","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18425"},{"name":"18373","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18373"},{"name":"18303","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18303"},{"name":"DSA-931","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-931"},{"name":"18554","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18554"},{"name":"MDKSA-2006:003","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"name":"19230","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19230"},{"name":"102972","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"name":"MDKSA-2006:012","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"name":"DSA-962","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-962"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html"},{"name":"RHSA-2006:0163","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"name":"DSA-937","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-937"},{"name":"18398","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18398"},{"name":"FLSA-2006:176751","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"name":"2006-0002","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2006/0002/"},{"name":"SUSE-SA:2006:001","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"name":"DSA-936","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-936"},{"name":"FEDORA-2005-026","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"name":"18329","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18329"},{"name":"18463","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18463"},{"name":"18642","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18642"},{"name":"18674","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18674"},{"name":"MDKSA-2006:005","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"name":"18313","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18313"},{"name":"20051201-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"name":"20060101-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"name":"18448","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18448"},{"name":"18436","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18436"},{"name":"18428","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18428"},{"name":"18380","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18380"},{"name":"18423","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18423"},{"name":"18416","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18416"},{"name":"RHSA-2006:0177","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"name":"ADV-2007-2280","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"name":"GLSA-200601-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"name":"18335","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18335"},{"name":"18407","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18407"},{"name":"18332","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18332"},{"name":"18517","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18517"},{"name":"18582","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18582"},{"name":"18534","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18534"},{"name":"SSA:2006-045-09","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"name":"xpdf-ccittfaxdecode-dctdecode-dos(24023)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023"},{"name":"18908","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18908"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html"},{"name":"25729","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25729"},{"name":"18414","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18414"},{"name":"MDKSA-2006:006","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"name":"18338","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18338"},{"name":"MDKSA-2006:008","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"name":"20060201-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"name":"RHSA-2006:0160","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"name":"MDKSA-2006:010","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"name":"DSA-940","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-940"},{"name":"MDKSA-2006:004","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"name":"ADV-2006-0047","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"name":"GLSA-200601-17","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"name":"18389","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18389"},{"name":"SSA:2006-045-04","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"name":"19377","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19377"},{"name":"FEDORA-2005-025","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"name":"FLSA:175404","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"name":"DSA-961","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-961"},{"name":"18675","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18675"},{"name":"18913","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18913"},{"name":"DSA-938","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-938"},{"name":"18334","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18334"},{"name":"18375","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18375"},{"name":"DSA-950","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-950"},{"name":"18387","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18387"},{"name":"MDKSA-2006:011","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"name":"18385","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18385"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-01-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"16143","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/16143"},{"name":"DSA-932","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-932"},{"name":"18349","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18349"},{"name":"oval:org.mitre.oval:def:9575","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575"},{"name":"18147","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18147"},{"name":"SCOSA-2006.15","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"tags":["x_refsource_MISC"],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"name":"18679","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18679"},{"name":"18312","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18312"},{"name":"18644","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18644"},{"name":"USN-236-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/236-1/"},{"name":"18425","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18425"},{"name":"18373","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18373"},{"name":"18303","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18303"},{"name":"DSA-931","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-931"},{"name":"18554","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18554"},{"name":"MDKSA-2006:003","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"name":"19230","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19230"},{"name":"102972","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"name":"MDKSA-2006:012","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"name":"DSA-962","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-962"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html"},{"name":"RHSA-2006:0163","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"name":"DSA-937","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-937"},{"name":"18398","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18398"},{"name":"FLSA-2006:176751","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"name":"2006-0002","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2006/0002/"},{"name":"SUSE-SA:2006:001","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"name":"DSA-936","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-936"},{"name":"FEDORA-2005-026","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"name":"18329","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18329"},{"name":"18463","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18463"},{"name":"18642","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18642"},{"name":"18674","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18674"},{"name":"MDKSA-2006:005","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"name":"18313","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18313"},{"name":"20051201-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"name":"20060101-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"name":"18448","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18448"},{"name":"18436","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18436"},{"name":"18428","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18428"},{"name":"18380","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18380"},{"name":"18423","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18423"},{"name":"18416","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18416"},{"name":"RHSA-2006:0177","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"name":"ADV-2007-2280","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"name":"GLSA-200601-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"name":"18335","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18335"},{"name":"18407","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18407"},{"name":"18332","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18332"},{"name":"18517","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18517"},{"name":"18582","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18582"},{"name":"18534","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18534"},{"name":"SSA:2006-045-09","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"name":"xpdf-ccittfaxdecode-dctdecode-dos(24023)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023"},{"name":"18908","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18908"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html"},{"name":"25729","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25729"},{"name":"18414","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18414"},{"name":"MDKSA-2006:006","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"name":"18338","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18338"},{"name":"MDKSA-2006:008","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"name":"20060201-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"name":"RHSA-2006:0160","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"name":"MDKSA-2006:010","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"name":"DSA-940","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-940"},{"name":"MDKSA-2006:004","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"name":"ADV-2006-0047","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"name":"GLSA-200601-17","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"name":"18389","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18389"},{"name":"SSA:2006-045-04","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"name":"19377","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19377"},{"name":"FEDORA-2005-025","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"name":"FLSA:175404","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"name":"DSA-961","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-961"},{"name":"18675","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18675"},{"name":"18913","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18913"},{"name":"DSA-938","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-938"},{"name":"18334","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18334"},{"name":"18375","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18375"},{"name":"DSA-950","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-950"},{"name":"18387","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18387"},{"name":"MDKSA-2006:011","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"name":"18385","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18385"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2005-3625","datePublished":"2006-01-06T22:00:00.000Z","dateReserved":"2005-11-16T00:00:00.000Z","dateUpdated":"2024-08-07T23:17:23.366Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-12-31 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-399","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","matchCriteriaId":"B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","matchCriteriaId":"787B918D-9CCC-44FE-92AF-E8DF1E91A3C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","matchCriteriaId":"C116493B-2837-4531-9291-A9FF03099A97"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","matchCriteriaId":"525BD04B-387F-4713-BC89-472D0D0BCFD0"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","matchCriteriaId":"6BF92649-90CE-4E75-A938-61D0916B5A7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","matchCriteriaId":"2CA505B4-0C17-49C8-9533-CA8CE3AA77D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","matchCriteriaId":"37C08E0A-651F-458B-BCEC-A30DCD527E47"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"6000D6AF-C056-4BC0-A54C-72E23E52AB92"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"A7D036E4-FA49-417D-968B-9D73B16A09BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","matchCriteriaId":"EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","matchCriteriaId":"BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"EAC32BAA-99B3-4B40-83A3-ED9E1B12B295"},{"vulnerable":true,"criteria":"cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","matchCriteriaId":"679D9520-DE8E-4D06-A227-3B1C1D05977D"},{"vulnerable":true,"criteria":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","matchCriteriaId":"63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","matchCriteriaId":"EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"C86C7D6F-C39E-4403-86C6-F87599570E97"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","matchCriteriaId":"236005A1-C175-44D3-8D0C-C48F943F3D66"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"0AF2AD80-5E65-4B57-933B-C395E98EF10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"07C92A0E-1DDA-4F83-A904-24A35C38883A"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","matchCriteriaId":"9178B36F-41D5-4AE7-B9C8-56BDEADE76EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7B93B3ED-AF82-49A9-8C7F-E5F652F19669"},{"vulnerable":true,"criteria":"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"A35FC777-A34E-4C7B-9E93-8F17F3AD5180"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2CAE037F-111C-4A76-8FFE-716B74D65EF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","matchCriteriaId":"A6B060E4-B5A6-4469-828E-211C52542547"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","matchCriteriaId":"974C3541-990C-4CD4-A05A-38FA74A84632"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","matchCriteriaId":"6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","matchCriteriaId":"58792F77-B06F-4780-BA25-FE1EE6C3FDD9"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","matchCriteriaId":"C9419322-572F-4BB6-8416-C5E96541CF33"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","matchCriteriaId":"BFC50555-C084-46A3-9C9F-949C5E3BB448"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","matchCriteriaId":"9C25D6E1-D283-4CEA-B47B-60C47A5C0797"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","matchCriteriaId":"AD18A446-C634-417E-86AC-B19B6DDDC856"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","matchCriteriaId":"E4BB852E-61B2-4842-989F-C6C0C901A8D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","matchCriteriaId":"24DD9D59-E2A2-4116-A887-39E8CC2004FC"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","matchCriteriaId":"F28D7457-607E-4E0C-909A-413F91CFCD82"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","matchCriteriaId":"5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","matchCriteriaId":"AF8AE8C4-810F-41AB-A251-5A2D4DD6884D"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","matchCriteriaId":"5EACF214-FA27-44FF-A431-927AB79377A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","matchCriteriaId":"E2B58895-0E2A-4466-9CB2-0083349A83B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","matchCriteriaId":"03F8220A-9B1C-40AA-AEAB-F9A93225FBD5"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","matchCriteriaId":"2311919C-7864-469D-B0F6-9B11D8D0A1C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","matchCriteriaId":"19876495-4C1A-487C-955A-C5AA46362A1F"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","matchCriteriaId":"D75286DD-50BC-4B72-8AC8-E20730124DC2"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","matchCriteriaId":"1998C972-497E-4916-B50E-FB32303EEA8E"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","matchCriteriaId":"A6CD3DD9-3A8A-4716-A2D1-136A790AFF94"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","matchCriteriaId":"6CE2020A-4FB2-4FCD-8561-7BD147CD95EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","matchCriteriaId":"08E90AFA-C262-46D0-B60E-26B67C9602D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"647BA336-5538-4972-9271-383A0EC9378E"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","matchCriteriaId":"3528DABD-B821-4D23-AE12-614A9CA92C46"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","matchCriteriaId":"0315FB43-D199-4734-B724-50ED031C0020"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","matchCriteriaId":"11D69B83-4EF3-407B-8E8C-DE623F099C17"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","matchCriteriaId":"7D221688-18A0-453D-8D13-6B68011FCA13"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","matchCriteriaId":"597094EC-D23F-4EC4-A140-96F287679124"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","matchCriteriaId":"C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","matchCriteriaId":"E0F0D201-B1DC-4024-AF77-A284673618F3"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","matchCriteriaId":"052E3862-BFB7-42E7-889D-8590AFA8EF37"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2BB0B27C-04EA-426F-9016-7406BACD91DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","matchCriteriaId":"BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","matchCriteriaId":"2641EE56-6F9D-400B-B456-877F4DA79B10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","matchCriteriaId":"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E0B458EA-495E-40FA-9379-C03757F7B1EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","matchCriteriaId":"409E324A-C040-494F-A026-9DCAE01C07F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","matchCriteriaId":"1728AB5D-55A9-46B0-A412-6F7263CAEB5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","matchCriteriaId":"6474B775-C893-491F-A074-802AFB1FEDD8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"EC79FF22-2664-4C40-B0B3-6D23B5F45162"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","matchCriteriaId":"0EFE2E73-9536-41A9-B83B-0A06B54857F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"F9440B25-D206-4914-9557-B5F030890DEC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E9933557-3BCA-4D92-AD4F-27758A0D3347"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","matchCriteriaId":"10A60552-15A5-4E95-B3CE-99A4B26260C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7D74A418-50F0-42C0-ABBC-BBBE718FF025"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","matchCriteriaId":"3C84296C-2C8A-4DCD-9751-52951F8BEA9F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","matchCriteriaId":"E6996B14-925B-46B8-982F-3545328B506B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","matchCriteriaId":"EC80CF67-C51D-442C-9526-CFEDE84A6304"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","matchCriteriaId":"C720DACC-CF4B-4A00-818C-8303A7D7DED6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","matchCriteriaId":"9B502A61-44FB-4CD4-85BE-88D4ACCCA441"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","matchCriteriaId":"F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","matchCriteriaId":"84A50ED3-FD0D-4038-B3E7-CC65D166C968"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","matchCriteriaId":"8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"D9D76A8D-832B-411E-A458-186733C66010"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","matchCriteriaId":"7458BA31-812E-40C9-BB92-8688A3BCBA56"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"300A6A65-05FD-401C-80F6-B5F5B1F056E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","matchCriteriaId":"AA3D53C9-3806-45E6-8AE9-7D41280EF64C"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"D29C5A03-A7C9-4780-BB63-CF1E874D018D"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","matchCriteriaId":"B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","matchCriteriaId":"70440F49-AEE9-41BE-8E1A-43AB657C8E09"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"02EE2D72-B1E6-4380-80B0-E40A23DDD115"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"F7446746-87B7-4BD3-AABF-1E0FAA8265AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","matchCriteriaId":"F239BA8A-6B41-4B08-8C7C-25D235812C50"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","matchCriteriaId":"89BA858B-9466-4640-84AE-DC5BDC65D6B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","matchCriteriaId":"85F2D904-E830-4034-9CCB-0FF65019622C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","matchCriteriaId":"56EF103F-5668-4754-A83B-D3662D0CE815"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","matchCriteriaId":"3EA56868-ACA1-4C65-9FFB-A68129D2428A"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","matchCriteriaId":"1BA2E629-58C6-4BA0-A447-F8F570B35E74"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","matchCriteriaId":"D5F98B9A-880E-45F0-8C16-12B22970F0D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","matchCriteriaId":"3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","matchCriteriaId":"C89BA3B6-370B-4911-A363-935A9C9EACF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","matchCriteriaId":"B905C6E9-5058-4FD7-95B6-CD6AB6B2F516"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","matchCriteriaId":"4F1B4D15-0562-44D6-B80B-35A8F432BD41"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","matchCriteriaId":"D84ABF78-0D85-4E15-907E-B5ACE86EB8C7"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","matchCriteriaId":"9C7018E7-F90C-435D-A07A-05A294EA2827"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","matchCriteriaId":"16915004-1006-41D6-9E42-D1A5041E442D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","matchCriteriaId":"994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5AB70F82-52BB-4D0D-9A24-9AF67278466D"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"100A2456-BF20-4461-8DC9-C61889322B29"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","matchCriteriaId":"1C7D4F57-E186-497A-B390-92E5D2C7E894"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","matchCriteriaId":"CEC3F6F3-9A6E-4A98-A967-6776C872475C"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","matchCriteriaId":"FC3218DD-A565-4AB8-86FE-E7F59AC0535F"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","matchCriteriaId":"97AEDB57-202F-4B53-8815-21836F177060"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","matchCriteriaId":"31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","matchCriteriaId":"065FF0F1-7FAC-4584-92EA-EAA87DC76FA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","matchCriteriaId":"E27180A1-9767-4CD3-978C-7538155B162D"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","matchCriteriaId":"BAAA9376-A060-49AE-86A7-6B28E26ED5D9"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","matchCriteriaId":"E06DCF0D-3241-453A-A0E4-937FE25EC404"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","matchCriteriaId":"B484D091-62DE-4EF2-AC54-26896CA8B315"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","matchCriteriaId":"EC5AC26E-3F3F-4D14-BE65-82B4432AB382"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","matchCriteriaId":"9428589A-0BD2-469E-978D-38239117D972"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","matchCriteriaId":"6E94583A-5184-462E-9FC4-57B35DA06DA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","matchCriteriaId":"E905FAAD-37B6-4DD0-A752-2974F8336273"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","matchCriteriaId":"3BD12488-1ED8-4751-ABF5-3578D54750A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","matchCriteriaId":"AE3733CF-4C88-443C-9B90-6477C9C500D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","matchCriteriaId":"9C500A75-D75E-45B4-B582-0F0DF27C3C04"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","matchCriteriaId":"86FD134D-A5C5-4B08-962D-70CF07C74923"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","matchCriteriaId":"FA84692E-F99D-4207-B4F2-799A6ADB88AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","matchCriteriaId":"8B0F1091-4B76-44F5-B896-6D37E2F909A2"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3625","Ordinal":"1","Title":"CVE-2005-3625","CVE":"CVE-2005-3625","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3625","Ordinal":"1","NoteData":"Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"","Type":"Description","Title":"CVE-2005-3625"},{"CveYear":"2005","CveId":"3625","Ordinal":"2","NoteData":"2006-01-06","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3625","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}