First published: Sat Dec 31 2005(Updated: )
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.22 | |
KDE KPDF | =3.4.3 | |
KDE Graphics | =3.4.3 | |
teTeX | =3.0 | |
KDE KOffice | =1.4.1 | |
KWord | =1.4.2 | |
Poppler Utilities | =0.4.2 | |
teTeX | =1.0.7 | |
SGI ProPack | =3.0-sp6 | |
CUPS (Common UNIX Printing System) | =1.1.23_rc1 | |
KDE Graphics | =3.2 | |
KDE KOffice | =1.4.2 | |
libextractor | ||
CUPS (Common UNIX Printing System) | =1.1.22_rc1 | |
Xpdf | =3.0 | |
teTeX | =2.0.2 | |
teTeX | =2.0.1 | |
Conectiva Linux | =10.0 | |
KDE KPDF | =3.2 | |
CUPS (Common UNIX Printing System) | =1.1.23 | |
KDE KOffice | =1.4 | |
teTeX | =2.0 | |
SUSE Linux | =9.0 | |
Slackware Linux | =9.0 | |
Mandrake Linux | =2006 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
SUSE Linux | =9.0 | |
Red Hat Fedora Core | =core_2.0 | |
Turbolinux | ||
Red Hat Enterprise Linux | =4.0 | |
Slackware Linux | =10.0 | |
Slackware Linux | =10.2 | |
Trustix Secure Linux | =2.0 | |
Mandriva Linux Corporate Server | =2.1 | |
redhat enterprise Linux desktop | =3.0 | |
SUSE Linux | =9.0 | |
Debian | =3.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
Debian | =3.1 | |
Ubuntu | =4.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
SUSE Linux | =10.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
TurboLinux Appliance Server | =1.0_workgroup_edition | |
Red Hat Linux Advanced Workstation | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
Debian | =3.1 | |
Debian | =3.1 | |
Slackware Linux | =10.1 | |
Slackware Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.0 | |
Debian | =3.1 | |
Trustix Secure Linux | =3.0 | |
Red Hat Fedora Core | =core_1.0 | |
Ubuntu | =5.04 | |
Debian | =3.1 | |
Ubuntu | =5.10 | |
Debian | =3.0 | |
Mandrake Linux | =10.1 | |
Debian | =3.0 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
Xinuos OpenServer | =5.0.7 | |
Debian | =3.0 | |
Red Hat Linux | =9.0 | |
Ubuntu | =5.10 | |
SUSE Linux | =9.2 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Fedora Core | =core_4.0 | |
Turbolinux Server | =10.0_x86 | |
SUSE Linux | =10.0 | |
Debian | =3.0 | |
SUSE Linux | =1.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Turbolinux | ||
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
Debian | =3.1 | |
Turbolinux Workstation | =8.0 | |
Red Hat Enterprise Linux | =3.0 | |
Turbolinux | =fuji | |
Debian | =3.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
TurboLinux Personal | ||
Turbolinux | =10 | |
Red Hat Linux | =7.3 | |
Xinuos OpenServer | =6.0 | |
Red Hat Enterprise Linux | =2.1 | |
redhat enterprise Linux desktop | =4.0 | |
Ubuntu | =5.04 | |
Trustix Secure Linux | =2.2 | |
Turbolinux Server | =8.0 | |
SUSE Linux | =9.3 | |
Red Hat Fedora Core | =core_3.0 | |
Ubuntu | =4.1 | |
Debian | =3.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
Turbolinux Server | =10.0 | |
Gentoo Linux | ||
TurboLinux Desktop | =10.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
TurboLinux Appliance Server | =1.0_hosting_edition | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =2.1 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =2006 | |
Mandrake Linux | =10.1 | |
Red Hat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3625 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To remediate CVE-2005-3625, users should upgrade to the latest version of affected software that addresses this vulnerability.
CVE-2005-3625 affects various software including Xpdf, KDE KPDF, Poppler, and CUPS among others.
Exploiting CVE-2005-3625 may lead to an infinite loop, resulting in denial of service and increased CPU usage.
Yes, specific vulnerable versions include Xpdf 3.0, KDE KPDF 3.2 to 3.4.3, and CUPS versions 1.1.22 to 1.1.23.