First published: Wed Dec 07 2005(Updated: )
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf | =2.0 | |
Xpdf | =3.0_pl3 | |
Xpdf | =1.0 | |
Xpdf | =0.91 | |
Xpdf | =2.3 | |
Xpdf | =0.92 | |
Xpdf | =3.0.1 | |
Xpdf | =1.0a | |
Xpdf | =2.2 | |
Xpdf | =3.0_pl2 | |
Xpdf | =2.1 | |
Xpdf | =0.90 | |
Xpdf | =3.0 | |
Xpdf | =0.93 | |
Xpdf | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3191 is considered to have a high severity due to multiple heap-based buffer overflows that can be exploited.
To fix CVE-2005-3191, you should upgrade to a version of Xpdf that is newer than 3.01, which no longer contains this vulnerability.
CVE-2005-3191 affects multiple software products including Xpdf, Poppler, and KDE kpdf among others.
Exploiting CVE-2005-3191 may allow an attacker to execute arbitrary code or crash the application.
CVE-2005-3191 was publicly disclosed in 2005, prompting the need for immediate security updates.