CWE
189 190
Advisory Published
CVE Published
Updated

CVE-2005-3624: Integer Overflow

First published: Sat Dec 31 2005(Updated: )

The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
CUPS (Common UNIX Printing System)=1.1.22
KDE KPDF=3.4.3
KDE Graphics=3.4.3
teTeX=3.0
KDE KOffice=1.4.1
KWord=1.4.2
Poppler Utilities=0.4.2
teTeX=1.0.7
SGI ProPack=3.0-sp6
CUPS (Common UNIX Printing System)=1.1.23_rc1
KDE Graphics=3.2
KDE KOffice=1.4.2
libextractor
CUPS (Common UNIX Printing System)=1.1.22_rc1
Xpdf=3.0
teTeX=2.0.2
teTeX=2.0.1
Conectiva Linux=10.0
KDE KPDF=3.2
CUPS (Common UNIX Printing System)=1.1.23
KDE KOffice=1.4
teTeX=2.0
SUSE Linux=9.0
Slackware Linux=9.0
Mandrake Linux=2006
Red Hat Enterprise Linux=2.1
Debian=3.1
SUSE Linux=9.0
Red Hat Fedora Core=core_2.0
Turbolinux
Red Hat Enterprise Linux=4.0
Slackware Linux=10.0
Slackware Linux=10.2
Trustix Secure Linux=2.0
Mandriva Linux Corporate Server=2.1
Red Hat Enterprise Linux Desktop=3.0
SUSE Linux=9.0
Debian=3.0
SUSE Linux=9.1
Mandrake Linux=10.2
Debian=3.1
Ubuntu Linux=4.1
Red Hat Linux Advanced Workstation=2.1
Debian=3.1
Debian=3.0
Debian=3.1
Red Hat Enterprise Linux=4.0
SUSE Linux=10.0
Red Hat Enterprise Linux=3.0
Red Hat Enterprise Linux=2.1
SUSE Linux=9.3
Debian=3.0
TurboLinux Appliance Server=1.0_workgroup_edition
Red Hat Linux Advanced Workstation=2.1
SUSE Linux=9.3
Debian=3.0
Debian=3.1
Debian=3.1
Slackware Linux=10.1
Slackware Linux=9.1
Red Hat Enterprise Linux=2.1
SUSE Linux=9.0
Debian=3.1
Trustix Secure Linux=3.0
Red Hat Fedora Core=core_1.0
Ubuntu Linux=5.04
Debian=3.1
Ubuntu Linux=5.10
Debian=3.0
Mandrake Linux=10.1
Debian=3.0
Ubuntu Linux=5.04
Ubuntu Linux=5.10
Xinuos OpenServer=5.0.7
Debian=3.0
Red Hat Linux=9.0
Ubuntu Linux=5.10
SUSE Linux=9.2
Mandriva Linux Corporate Server=3.0
Red Hat Fedora Core=core_4.0
Turbolinux Server=10.0_x86
SUSE Linux=10.0
Debian=3.0
SUSE Linux=1.0
Mandriva Linux Corporate Server=3.0
Turbolinux
Debian=3.1
Red Hat Enterprise Linux=4.0
Debian=3.1
Turbolinux Workstation=8.0
Red Hat Enterprise Linux=3.0
Turbolinux=fuji
Debian=3.0
SUSE Linux=9.0
SUSE Linux=9.1
Red Hat Enterprise Linux=2.1
Debian=3.1
Debian=3.0
TurboLinux Personal
Turbolinux=10
Red Hat Linux=7.3
Xinuos OpenServer=6.0
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux Desktop=4.0
Ubuntu Linux=5.04
Trustix Secure Linux=2.2
Turbolinux Server=8.0
SUSE Linux=9.3
Red Hat Fedora Core=core_3.0
Ubuntu Linux=4.1
Debian=3.1
SUSE Linux=9.2
SUSE Linux=9.2
Turbolinux Server=10.0
Gentoo Linux
TurboLinux Desktop=10.0
SUSE Linux=9.1
Mandrake Linux=10.2
TurboLinux Appliance Server=1.0_hosting_edition
Debian=3.0
Debian=3.0
Debian=3.1
Red Hat Enterprise Linux=2.1
Mandriva Linux Corporate Server=2.1
Mandrake Linux=2006
Mandrake Linux=10.1
Red Hat Enterprise Linux=3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2005-3624?

    CVE-2005-3624 is classified as a high severity vulnerability due to potential heap corruption leading to arbitrary code execution.

  • How do I fix CVE-2005-3624?

    To address CVE-2005-3624, it is recommended to update the affected software to the latest patched version available.

  • What types of attacks can exploit CVE-2005-3624?

    Exploitation of CVE-2005-3624 could allow attackers to execute arbitrary code on the vulnerable system by sending specially crafted CCITTFaxDecode streams.

  • Which software is affected by CVE-2005-3624?

    Software affected by CVE-2005-3624 includes CUPS, Xpdf, KPDF, Poppler, and teTeX, among others.

  • What is the impact of CVE-2005-3624 on my system?

    The impact of CVE-2005-3624 could be severe as it may lead to system crashes, data corruption, or remote code execution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203