Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20051201-01-UÂ - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20060101-01-UÂ - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20060201-01-UÂ - | |
References | () http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html - Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2006-0177.html - Patch, Vendor Advisory | |
References | () http://scary.beasts.org/security/CESA-2005-003.txt - Exploit | |
References | () http://secunia.com/advisories/18147Â - | |
References | () http://secunia.com/advisories/18303Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18312Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18313Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18329Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18332Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18334Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18335Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18338Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18349Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18373Â - | |
References | () http://secunia.com/advisories/18375Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18380Â - | |
References | () http://secunia.com/advisories/18385Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18387Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18389Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18398Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18407Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18414Â - | |
References | () http://secunia.com/advisories/18416Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18423Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18425Â - | |
References | () http://secunia.com/advisories/18428Â - | |
References | () http://secunia.com/advisories/18436Â - | |
References | () http://secunia.com/advisories/18448Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18463Â - | |
References | () http://secunia.com/advisories/18517Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18534Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18554Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18582Â - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18642Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18644Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18674Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18675Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18679Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18908Â - Vendor Advisory | |
References | () http://secunia.com/advisories/18913Â - | |
References | () http://secunia.com/advisories/19230Â - | |
References | () http://secunia.com/advisories/19377Â - | |
References | () http://secunia.com/advisories/25729Â - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683Â - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747Â - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1Â - | |
References | () http://www.debian.org/security/2005/dsa-931Â - | |
References | () http://www.debian.org/security/2005/dsa-932Â - | |
References | () http://www.debian.org/security/2005/dsa-937Â - | |
References | () http://www.debian.org/security/2005/dsa-938Â - | |
References | () http://www.debian.org/security/2005/dsa-940Â - | |
References | () http://www.debian.org/security/2006/dsa-936Â - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-950Â - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-961Â - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-962Â - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml - | |
References | () http://www.kde.org/info/security/advisory-20051207-2.txt - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:003Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:004Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:005Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:006Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:008Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:010Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:011Â - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:012Â - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html - Patch | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html - Patch | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0160.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0163.html - | |
References | () http://www.securityfocus.com/archive/1/427053/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/427990/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16143Â - Patch | |
References | () http://www.trustix.org/errata/2006/0002/Â - | |
References | () http://www.vupen.com/english/advisories/2006/0047Â - | |
References | () http://www.vupen.com/english/advisories/2007/2280Â - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24023Â - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575Â - | |
References | () https://usn.ubuntu.com/236-1/Â - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3625
Mitre link : CVE-2005-3625
CVE.ORG link : CVE-2005-3625
JSON object : View
Products Affected
turbolinux
- turbolinux_server
- turbolinux_home
- turbolinux
- turbolinux_desktop
- turbolinux_appliance_server
- turbolinux_workstation
- turbolinux_personal
- turbolinux_multimedia
mandrakesoft
- mandrake_linux_corporate_server
- mandrake_linux
gentoo
- linux
redhat
- fedora_core
- linux
- linux_advanced_workstation
- enterprise_linux
- enterprise_linux_desktop
sgi
- propack
kde
- kword
- koffice
- kpdf
- kdegraphics
sco
- openserver
slackware
- slackware_linux
suse
- suse_linux
poppler
- poppler
trustix
- secure_linux
conectiva
- linux
xpdf
- xpdf
libextractor
- libextractor
easy_software_products
- cups
tetex
- tetex
debian
- debian_linux
ubuntu
- ubuntu_linux
CWE
CWE-399
Resource Management Errors