First published: Wed Dec 07 2005(Updated: )
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf Xpdf | =2.0 | |
Xpdf Xpdf | =3.0_pl3 | |
Xpdf Xpdf | =1.0 | |
Xpdf Xpdf | =0.91 | |
Xpdf Xpdf | =2.3 | |
Xpdf Xpdf | =0.92 | |
Xpdf Xpdf | =3.0.1 | |
Xpdf Xpdf | =1.0a | |
Xpdf Xpdf | =2.2 | |
Xpdf Xpdf | =3.0_pl2 | |
Xpdf Xpdf | =2.1 | |
Xpdf Xpdf | =0.90 | |
Xpdf Xpdf | =3.0 | |
Xpdf Xpdf | =0.93 | |
Xpdf Xpdf | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.