First published: Sat Dec 31 2005(Updated: )
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.22 | |
KDE KPDF | =3.4.3 | |
KDE Graphics | =3.4.3 | |
teTeX | =3.0 | |
KDE KOffice | =1.4.1 | |
KWord | =1.4.2 | |
Poppler Utilities | =0.4.2 | |
teTeX | =1.0.7 | |
SGI ProPack | =3.0-sp6 | |
CUPS (Common UNIX Printing System) | =1.1.23_rc1 | |
KDE Graphics | =3.2 | |
KDE KOffice | =1.4.2 | |
libextractor | ||
CUPS (Common UNIX Printing System) | =1.1.22_rc1 | |
Xpdf | =3.0 | |
teTeX | =2.0.2 | |
teTeX | =2.0.1 | |
Conectiva Linux | =10.0 | |
KDE KPDF | =3.2 | |
CUPS (Common UNIX Printing System) | =1.1.23 | |
KDE KOffice | =1.4 | |
teTeX | =2.0 | |
SUSE Linux | =9.0 | |
Slackware Linux | =9.0 | |
Mandrake Linux | =2006 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
SUSE Linux | =9.0 | |
Red Hat Fedora Core | =core_2.0 | |
Turbolinux | ||
Red Hat Enterprise Linux | =4.0 | |
Slackware Linux | =10.0 | |
Slackware Linux | =10.2 | |
Trustix Secure Linux | =2.0 | |
Mandriva Linux Corporate Server | =2.1 | |
redhat enterprise Linux desktop | =3.0 | |
SUSE Linux | =9.0 | |
Debian | =3.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
Debian | =3.1 | |
Ubuntu | =4.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
SUSE Linux | =10.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
TurboLinux Appliance Server | =1.0_workgroup_edition | |
Red Hat Linux Advanced Workstation | =2.1 | |
SUSE Linux | =9.3 | |
Debian | =3.0 | |
Debian | =3.1 | |
Debian | =3.1 | |
Slackware Linux | =10.1 | |
Slackware Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
SUSE Linux | =9.0 | |
Debian | =3.1 | |
Trustix Secure Linux | =3.0 | |
Red Hat Fedora Core | =core_1.0 | |
Ubuntu | =5.04 | |
Debian | =3.1 | |
Ubuntu | =5.10 | |
Debian | =3.0 | |
Mandrake Linux | =10.1 | |
Debian | =3.0 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
Xinuos OpenServer | =5.0.7 | |
Debian | =3.0 | |
Red Hat Linux | =9.0 | |
Ubuntu | =5.10 | |
SUSE Linux | =9.2 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Fedora Core | =core_4.0 | |
Turbolinux Server | =10.0_x86 | |
SUSE Linux | =10.0 | |
Debian | =3.0 | |
SUSE Linux | =1.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Turbolinux | ||
Debian | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
Debian | =3.1 | |
Turbolinux Workstation | =8.0 | |
Red Hat Enterprise Linux | =3.0 | |
Turbolinux | =fuji | |
Debian | =3.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
Red Hat Enterprise Linux | =2.1 | |
Debian | =3.1 | |
Debian | =3.0 | |
TurboLinux Personal | ||
Turbolinux | =10 | |
Red Hat Linux | =7.3 | |
Xinuos OpenServer | =6.0 | |
Red Hat Enterprise Linux | =2.1 | |
redhat enterprise Linux desktop | =4.0 | |
Ubuntu | =5.04 | |
Trustix Secure Linux | =2.2 | |
Turbolinux Server | =8.0 | |
SUSE Linux | =9.3 | |
Red Hat Fedora Core | =core_3.0 | |
Ubuntu | =4.1 | |
Debian | =3.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
Turbolinux Server | =10.0 | |
Gentoo Linux | ||
TurboLinux Desktop | =10.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =10.2 | |
TurboLinux Appliance Server | =1.0_hosting_edition | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.1 | |
Red Hat Enterprise Linux | =2.1 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =2006 | |
Mandrake Linux | =10.1 | |
Red Hat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3626 has a severity rating that indicates it can cause a denial of service due to a null dereference.
To fix CVE-2005-3626, users should update their affected software to the latest versions that include patches for this vulnerability.
Affected software includes Xpdf, KDE KPDF, teTeX, CUPS, and Poppler among others.
CVE-2005-3626 is classified as a denial of service vulnerability.
CVE-2005-3626 was reported in December 2005.