CVE-2005-3625

Severity

99%

Complexity

99%

Confidentiality

165%

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

CVSS 2.0 Base Score 9.9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 19 years ago

2005-12-31 05:00:00

Last updated 6 years ago

2018-10-19 15:37:00

Affected Software

KDE KOffice 1.4

1.4

KDE KOffice 1.4.1

1.4.1

KDE KOffice 1.4.2

1.4.2

Conectiva Linux 10.0

10.0

Debian Debian Linux 3.0

3.0

Debian Debian Linux 3.1

3.1

Gentoo Linux

MandrakeSoft Mandrake Linux 10.1

10.1

MandrakeSoft Mandrake Linux 10.2

10.2

MandrakeSoft Mandrake Linux 2006.0

2006

MandrakeSoft Mandrake Linux Corporate Server 2.1

2.1

MandrakeSoft Mandrake Corporate Server 3.0

3.0

Red Hat Desktop 3.0

3.0

Red Hat Desktop 4.0

4.0

Slackware Linux 9.0

9.0

Slackware Linux 9.1

9.1

Slackware Linux 10.0

10.0

Slackware Linux 10.1

10.1

Slackware Linux 10.2

10.2

SuSE SuSE Linux 1.0

1.0

Trustix Secure Linux 2.0

2.0

Trustix Secure Linux 2.2

2.2

Trustix Secure Linux 3.0

3.0

References

SCOSA-2006.15

20051201-01-U

20060101-01-U

20060201-01-U

SUSE-SA:2006:001

Patch

RHSA-2006:0177

Patch, Vendor Advisory

http://scary.beasts.org/security/CESA-2005-003.txt

Exploit

18147

18303

Patch, Vendor Advisory

18312

Patch, Vendor Advisory

18313

Patch, Vendor Advisory

18329

Vendor Advisory

18332

Vendor Advisory

18334

Patch, Vendor Advisory

18335

Patch, Vendor Advisory

18338

Patch, Vendor Advisory

18349

Patch, Vendor Advisory

18373

18375

Vendor Advisory

18380

18385

Patch, Vendor Advisory

18387

Patch, Vendor Advisory

18389

Patch, Vendor Advisory

18398

Patch, Vendor Advisory

18407

Patch, Vendor Advisory

18414

18416

Patch, Vendor Advisory

18423

Patch, Vendor Advisory

18425

18428

18436

18448

Patch, Vendor Advisory

18463

18517

Patch, Vendor Advisory

18534

Patch, Vendor Advisory

18554

Patch, Vendor Advisory

18582

Patch, Vendor Advisory

18642

Vendor Advisory

18644

Vendor Advisory

18674

Vendor Advisory

18675

Vendor Advisory

18679

Vendor Advisory

18908

Vendor Advisory

18913

19230

19377

25729

SSA:2006-045-09

SSA:2006-045-04

102972

DSA-931

DSA-932

DSA-937

DSA-938

DSA-940

DSA-936

Patch, Vendor Advisory

DSA-950

Patch, Vendor Advisory

DSA-961

Patch, Vendor Advisory

DSA-962

GLSA-200601-02

Patch, Vendor Advisory

GLSA-200601-17

http://www.kde.org/info/security/advisory-20051207-2.txt

Patch, Vendor Advisory

MDKSA-2006:003

MDKSA-2006:004

MDKSA-2006:005

MDKSA-2006:006

MDKSA-2006:008

MDKSA-2006:010

MDKSA-2006:011

MDKSA-2006:012

http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html

Patch

http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html

Patch

FEDORA-2005-025

FEDORA-2005-026

RHSA-2006:0160

Patch, Vendor Advisory

RHSA-2006:0163

FLSA-2006:176751

FLSA:175404

16143

Patch

2006-0002

ADV-2006-0047

ADV-2007-2280

xpdf-ccittfaxdecode-dctdecode-dos(24023)

oval:org.mitre.oval:def:9575

USN-236-1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.