First published: Sat Dec 31 2005(Updated: )
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.22 | |
CUPS (Common UNIX Printing System) | =1.1.22_rc1 | |
CUPS (Common UNIX Printing System) | =1.1.23 | |
CUPS (Common UNIX Printing System) | =1.1.23_rc1 | |
KDE Kdegraphics | =3.2 | |
KDE Kdegraphics | =3.4.3 | |
KDE KOffice | =1.4 | |
KDE KOffice | =1.4.1 | |
KDE KOffice | =1.4.2 | |
KDE KPDF | =3.2 | |
KDE KPDF | =3.4.3 | |
KWord | =1.4.2 | |
libextractor | ||
Poppler Data | =0.4.2 | |
SGI ProPack | =3.0-sp6 | |
teTeX | =1.0.7 | |
teTeX | =2.0 | |
teTeX | =2.0.1 | |
teTeX | =2.0.2 | |
teTeX | =3.0 | |
Xpdf | =3.0 | |
Conectiva Linux | =10.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Debian Linux | =3.1 | |
Gentoo Linux | ||
Mandrake Linux | =10.1 | |
Mandrake Linux | =10.1 | |
Mandrake Linux | =10.2 | |
Mandrake Linux | =10.2 | |
Mandrake Linux | =2006 | |
Mandrake Linux | =2006 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Fedora Core | =core_1.0 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 | |
Red Hat Fedora Core | =core_4.0 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =9.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
SCO OpenServer | =5.0.7 | |
SCO OpenServer | =6.0 | |
Slackware Linux | =9.0 | |
Slackware Linux | =9.1 | |
Slackware Linux | =10.0 | |
Slackware Linux | =10.1 | |
Slackware Linux | =10.2 | |
SUSE Linux | =1.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =10.0 | |
SUSE Linux | =10.0 | |
Trustix Secure Linux | =2.0 | |
Trustix Secure Linux | =2.2 | |
Trustix Secure Linux | =3.0 | |
Turbolinux | =10 | |
Turbolinux | =fuji | |
TurboLinux Appliance Server | =1.0_hosting_edition | |
TurboLinux Appliance Server | =1.0_workgroup_edition | |
TurboLinux Desktop | =10.0 | |
Turbolinux | ||
Turbolinux | ||
TurboLinux Personal | ||
Turbolinux Server | =8.0 | |
Turbolinux Server | =10.0 | |
Turbolinux Server | =10.0_x86 | |
Turbolinux Workstation | =8.0 | |
Ubuntu | =4.1 | |
Ubuntu | =4.1 | |
Ubuntu | =5.04 | |
Ubuntu | =5.04 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
Ubuntu | =5.10 | |
Ubuntu | =5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3625 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To remediate CVE-2005-3625, users should upgrade to the latest version of affected software that addresses this vulnerability.
CVE-2005-3625 affects various software including Xpdf, KDE KPDF, Poppler, and CUPS among others.
Exploiting CVE-2005-3625 may lead to an infinite loop, resulting in denial of service and increased CPU usage.
Yes, specific vulnerable versions include Xpdf 3.0, KDE KPDF 3.2 to 3.4.3, and CUPS versions 1.1.22 to 1.1.23.