Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2005-3193

Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.03
EPSS Ranking 85.9%
CVSS Severity
CVSS v2 Score 5.1
References
Products affected by CVE-2005-3193
  • Xpdf » Xpdf » Version: 0.90
    cpe:2.3:a:xpdf:xpdf:0.90
  • Xpdf » Xpdf » Version: 0.91
    cpe:2.3:a:xpdf:xpdf:0.91
  • Xpdf » Xpdf » Version: 0.92
    cpe:2.3:a:xpdf:xpdf:0.92
  • Xpdf » Xpdf » Version: 0.93
    cpe:2.3:a:xpdf:xpdf:0.93
  • Xpdf » Xpdf » Version: 1.0
    cpe:2.3:a:xpdf:xpdf:1.0
  • Xpdf » Xpdf » Version: 1.0a
    cpe:2.3:a:xpdf:xpdf:1.0a
  • Xpdf » Xpdf » Version: 1.1
    cpe:2.3:a:xpdf:xpdf:1.1
  • Xpdf » Xpdf » Version: 2.0
    cpe:2.3:a:xpdf:xpdf:2.0
  • Xpdf » Xpdf » Version: 2.1
    cpe:2.3:a:xpdf:xpdf:2.1
  • Xpdf » Xpdf » Version: 2.2
    cpe:2.3:a:xpdf:xpdf:2.2
  • Xpdf » Xpdf » Version: 2.3
    cpe:2.3:a:xpdf:xpdf:2.3
  • Xpdf » Xpdf » Version: 3.0
    cpe:2.3:a:xpdf:xpdf:3.0
  • Xpdf » Xpdf » Version: 3.0.1
    cpe:2.3:a:xpdf:xpdf:3.0.1
  • Xpdf » Xpdf » Version: 3.0_pl2
    cpe:2.3:a:xpdf:xpdf:3.0_pl2
  • Xpdf » Xpdf » Version: 3.0_pl3
    cpe:2.3:a:xpdf:xpdf:3.0_pl3


Contact Us

Shodan ® - All rights reserved