Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch - Patch | |
References | () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921 - Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=110625368019554&w=2 - | |
References | () http://secunia.com/advisories/17277 - | |
References | () http://www.debian.org/security/2005/dsa-645 - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2005/dsa-648 - Patch, Vendor Advisory | |
References | () http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities - Exploit, Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:016 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:017 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:018 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:019 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:020 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:021 - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-026.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-034.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2005-053.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2005-057.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2005-059.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2005-066.html - Patch, Vendor Advisory | |
References | () http://www.trustix.org/errata/2005/0003/ - Patch, Vendor Advisory | |
References | () https://bugzilla.fedora.us/show_bug.cgi?id=2352 - Patch, Vendor Advisory | |
References | () https://bugzilla.fedora.us/show_bug.cgi?id=2353 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781 - | |
References | () https://security.gentoo.org/glsa/200501-28 - | |
References | () https://security.gentoo.org/glsa/200502-10 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0064
Mitre link : CVE-2005-0064
CVE.ORG link : CVE-2005-0064
JSON object : View
Products Affected
xpdf
- xpdf
CWE