CWE
399
Advisory Published
CVE Published
Updated

CVE-2005-3625

First published: Sat Dec 31 2005(Updated: )

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
CUPS (Common UNIX Printing System)=1.1.22
CUPS (Common UNIX Printing System)=1.1.22_rc1
CUPS (Common UNIX Printing System)=1.1.23
CUPS (Common UNIX Printing System)=1.1.23_rc1
KDE Kdegraphics=3.2
KDE Kdegraphics=3.4.3
KDE KOffice=1.4
KDE KOffice=1.4.1
KDE KOffice=1.4.2
KDE KPDF=3.2
KDE KPDF=3.4.3
KWord=1.4.2
libextractor
Poppler Data=0.4.2
SGI ProPack=3.0-sp6
teTeX=1.0.7
teTeX=2.0
teTeX=2.0.1
teTeX=2.0.2
teTeX=3.0
Xpdf=3.0
Conectiva Linux=10.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.0
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Debian Linux=3.1
Gentoo Linux
Mandrake Linux=10.1
Mandrake Linux=10.1
Mandrake Linux=10.2
Mandrake Linux=10.2
Mandrake Linux=2006
Mandrake Linux=2006
Mandriva Linux Corporate Server=2.1
Mandriva Linux Corporate Server=2.1
Mandriva Linux Corporate Server=3.0
Mandriva Linux Corporate Server=3.0
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=2.1
Red Hat Enterprise Linux=3.0
Red Hat Enterprise Linux=3.0
Red Hat Enterprise Linux=3.0
Red Hat Enterprise Linux=4.0
Red Hat Enterprise Linux=4.0
Red Hat Enterprise Linux=4.0
Red Hat Enterprise Linux Desktop=3.0
Red Hat Enterprise Linux Desktop=4.0
Red Hat Fedora Core=core_1.0
Red Hat Fedora Core=core_2.0
Red Hat Fedora Core=core_3.0
Red Hat Fedora Core=core_4.0
Red Hat Linux=7.3
Red Hat Linux=9.0
Red Hat Linux Advanced Workstation=2.1
Red Hat Linux Advanced Workstation=2.1
SCO OpenServer=5.0.7
SCO OpenServer=6.0
Slackware Linux=9.0
Slackware Linux=9.1
Slackware Linux=10.0
Slackware Linux=10.1
Slackware Linux=10.2
SUSE Linux=1.0
SUSE Linux=9.0
SUSE Linux=9.0
SUSE Linux=9.0
SUSE Linux=9.0
SUSE Linux=9.0
SUSE Linux=9.1
SUSE Linux=9.1
SUSE Linux=9.1
SUSE Linux=9.2
SUSE Linux=9.2
SUSE Linux=9.2
SUSE Linux=9.3
SUSE Linux=9.3
SUSE Linux=9.3
SUSE Linux=10.0
SUSE Linux=10.0
Trustix Secure Linux=2.0
Trustix Secure Linux=2.2
Trustix Secure Linux=3.0
Turbolinux=10
Turbolinux=fuji
TurboLinux Appliance Server=1.0_hosting_edition
TurboLinux Appliance Server=1.0_workgroup_edition
TurboLinux Desktop=10.0
Turbolinux
Turbolinux
TurboLinux Personal
Turbolinux Server=8.0
Turbolinux Server=10.0
Turbolinux Server=10.0_x86
Turbolinux Workstation=8.0
Ubuntu=4.1
Ubuntu=4.1
Ubuntu=5.04
Ubuntu=5.04
Ubuntu=5.04
Ubuntu=5.10
Ubuntu=5.10
Ubuntu=5.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2005-3625?

    CVE-2005-3625 is classified as a high severity vulnerability due to its potential to cause a denial of service.

  • How do I fix CVE-2005-3625?

    To remediate CVE-2005-3625, users should upgrade to the latest version of affected software that addresses this vulnerability.

  • What types of software are affected by CVE-2005-3625?

    CVE-2005-3625 affects various software including Xpdf, KDE KPDF, Poppler, and CUPS among others.

  • What are the potential consequences of exploiting CVE-2005-3625?

    Exploiting CVE-2005-3625 may lead to an infinite loop, resulting in denial of service and increased CPU usage.

  • Are there any specific versions of software that are vulnerable to CVE-2005-3625?

    Yes, specific vulnerable versions include Xpdf 3.0, KDE KPDF 3.2 to 3.4.3, and CUPS versions 1.1.22 to 1.1.23.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203