Vulnerability Details CVE-2005-3625
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.113
EPSS Ranking 93.2%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2005-3625
-
cpe:2.3:a:easy_software_products:cups:1.1.22
-
cpe:2.3:a:easy_software_products:cups:1.1.22_rc1
-
cpe:2.3:a:easy_software_products:cups:1.1.23
-
cpe:2.3:a:easy_software_products:cups:1.1.23_rc1
-
cpe:2.3:a:kde:kdegraphics:3.2
-
cpe:2.3:a:kde:kdegraphics:3.4.3
-
cpe:2.3:a:kde:koffice:1.4
-
cpe:2.3:a:kde:koffice:1.4.1
-
cpe:2.3:a:kde:koffice:1.4.2
-
-
-
cpe:2.3:a:kde:kword:1.4.2
-
cpe:2.3:a:libextractor:libextractor:*
-
cpe:2.3:a:poppler:poppler:0.4.2
-
cpe:2.3:a:sgi:propack:3.0
-
cpe:2.3:a:tetex:tetex:1.0.7
-
cpe:2.3:a:tetex:tetex:2.0
-
cpe:2.3:a:tetex:tetex:2.0.1
-
cpe:2.3:a:tetex:tetex:2.0.2
-
cpe:2.3:a:tetex:tetex:3.0
-
-
cpe:2.3:o:conectiva:linux:10.0
-
cpe:2.3:o:debian:debian_linux:3.0
-
cpe:2.3:o:debian:debian_linux:3.1
-
-
cpe:2.3:o:gentoo:linux:1.2
-
cpe:2.3:o:gentoo:linux:1.4
-
cpe:2.3:o:gentoo:linux:2.1.30
-
cpe:2.3:o:gentoo:linux:2.2.28
-
cpe:2.3:o:gentoo:linux:2.3.30
-
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1
-
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2
-
cpe:2.3:o:mandrakesoft:mandrake_linux:2006
-
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1
-
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
-
cpe:2.3:o:redhat:enterprise_linux:2.1
-
cpe:2.3:o:redhat:enterprise_linux:3.0
-
cpe:2.3:o:redhat:enterprise_linux:4.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0
-
cpe:2.3:o:redhat:fedora_core:core_1.0
-
cpe:2.3:o:redhat:fedora_core:core_2.0
-
cpe:2.3:o:redhat:fedora_core:core_3.0
-
cpe:2.3:o:redhat:fedora_core:core_4.0
-
cpe:2.3:o:redhat:linux:7.3
-
cpe:2.3:o:redhat:linux:9.0
-
cpe:2.3:o:redhat:linux_advanced_workstation:2.1
-
cpe:2.3:o:sco:openserver:5.0.7
-
cpe:2.3:o:sco:openserver:6.0
-
cpe:2.3:o:slackware:slackware_linux:10.0
-
cpe:2.3:o:slackware:slackware_linux:10.1
-
cpe:2.3:o:slackware:slackware_linux:10.2
-
cpe:2.3:o:slackware:slackware_linux:9.0
-
cpe:2.3:o:slackware:slackware_linux:9.1
-
cpe:2.3:o:suse:suse_linux:1.0
-
cpe:2.3:o:suse:suse_linux:10.0
-
cpe:2.3:o:suse:suse_linux:9.0
-
cpe:2.3:o:suse:suse_linux:9.1
-
cpe:2.3:o:suse:suse_linux:9.2
-
cpe:2.3:o:suse:suse_linux:9.3
-
cpe:2.3:o:trustix:secure_linux:2.0
-
cpe:2.3:o:trustix:secure_linux:2.2
-
cpe:2.3:o:trustix:secure_linux:3.0
-
cpe:2.3:o:turbolinux:turbolinux:10
-
cpe:2.3:o:turbolinux:turbolinux:fuji
-
cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition
-
cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition
-
cpe:2.3:o:turbolinux:turbolinux_desktop:10.0
-
cpe:2.3:o:turbolinux:turbolinux_home:*
-
cpe:2.3:o:turbolinux:turbolinux_multimedia:*
-
cpe:2.3:o:turbolinux:turbolinux_personal:*
-
cpe:2.3:o:turbolinux:turbolinux_server:10.0
-
cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86
-
cpe:2.3:o:turbolinux:turbolinux_server:8.0
-
cpe:2.3:o:turbolinux:turbolinux_workstation:8.0
-
cpe:2.3:o:ubuntu:ubuntu_linux:4.1
-
cpe:2.3:o:ubuntu:ubuntu_linux:5.04
-
cpe:2.3:o:ubuntu:ubuntu_linux:5.10