First published: Sat Dec 31 2005(Updated: )
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.22 | |
KDE KPDF | =3.4.3 | |
KDE Graphics | =3.4.3 | |
teTeX | =3.0 | |
KDE KOffice | =1.4.1 | |
KWord | =1.4.2 | |
Poppler Utilities | =0.4.2 | |
teTeX | =1.0.7 | |
SGI ProPack | =3.0-sp6 | |
CUPS (Common UNIX Printing System) | =1.1.23_rc1 | |
KDE Graphics | =3.2 | |
KDE KOffice | =1.4.2 | |
libextractor | ||
CUPS (Common UNIX Printing System) | =1.1.22_rc1 | |
Xpdf | =3.0 | |
teTeX | =2.0.2 | |
teTeX | =2.0.1 | |
Conectiva Linux | =10.0 | |
KDE KPDF | =3.2 | |
CUPS (Common UNIX Printing System) | =1.1.23 | |
KDE KOffice | =1.4 | |
teTeX | =2.0 | |
SUSE Linux | =9.0 | |
Slackware Linux | =9.0 | |
Mandrake Linux | =2006 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
SUSE Linux | =9.0 | |
Red Hat Fedora Core | =core_2.0 | |
Turbolinux | ||
Red Hat Enterprise Linux | =4.0 | |
Slackware Linux | =10.0 | |
Slackware Linux | =10.2 | |
Trustix Secure Linux | =2.0 | |
Mandriva Linux Corporate Server | =2.1 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
SUSE Linux | =9.0 | |
Debian | =3.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
Debian | =3.1 | |
Ubuntu Linux | =4.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
SUSE Linux | =10.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
TurboLinux Appliance Server | =1.0_workgroup_edition | |
Red Hat Linux Advanced Workstation | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
Debian | =3.1 | |
Debian | =3.1 | |
Slackware Linux | =10.1 | |
Slackware Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.0 | |
Debian | =3.1 | |
Trustix Secure Linux | =3.0 | |
Red Hat Fedora Core | =core_1.0 | |
Ubuntu Linux | =5.04 | |
Debian | =3.1 | |
Ubuntu Linux | =5.10 | |
Debian | =3.0 | |
Mandrake Linux | =10.1 | |
Debian | =3.0 | |
Ubuntu Linux | =5.04 | |
Ubuntu Linux | =5.10 | |
Xinuos OpenServer | =5.0.7 | |
Debian | =3.0 | |
Red Hat Linux | =9.0 | |
Ubuntu Linux | =5.10 | |
SUSE Linux | =9.2 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Fedora Core | =core_4.0 | |
Turbolinux Server | =10.0_x86 | |
SUSE Linux | =10.0 | |
Debian | =3.0 | |
SUSE Linux | =1.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Turbolinux | ||
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
Debian | =3.1 | |
Turbolinux Workstation | =8.0 | |
Red Hat Enterprise Linux | =3.0 | |
Turbolinux | =fuji | |
Debian | =3.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
TurboLinux Personal | ||
Turbolinux | =10 | |
Red Hat Linux | =7.3 | |
Xinuos OpenServer | =6.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Ubuntu Linux | =5.04 | |
Trustix Secure Linux | =2.2 | |
Turbolinux Server | =8.0 | |
SUSE Linux | =9.3 | |
Red Hat Fedora Core | =core_3.0 | |
Ubuntu Linux | =4.1 | |
Debian | =3.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
Turbolinux Server | =10.0 | |
Gentoo Linux | ||
TurboLinux Desktop | =10.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
TurboLinux Appliance Server | =1.0_hosting_edition | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =2.1 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =2006 | |
Mandrake Linux | =10.1 | |
Red Hat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3624 is classified as a high severity vulnerability due to potential heap corruption leading to arbitrary code execution.
To address CVE-2005-3624, it is recommended to update the affected software to the latest patched version available.
Exploitation of CVE-2005-3624 could allow attackers to execute arbitrary code on the vulnerable system by sending specially crafted CCITTFaxDecode streams.
Software affected by CVE-2005-3624 includes CUPS, Xpdf, KPDF, Poppler, and teTeX, among others.
The impact of CVE-2005-3624 could be severe as it may lead to system crashes, data corruption, or remote code execution.