First published: Sat Dec 31 2005(Updated: )
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3628 is classified as a critical security vulnerability due to its potential to execute arbitrary code.
To fix CVE-2005-3628, users should update to the latest version of affected software such as Xpdf, which includes patches for this vulnerability.
CVE-2005-3628 affects multiple software products, particularly Xpdf and its derivatives including gpdf, kpdf, and poppler.
CVE-2005-3628 involves a buffer overflow in the JBIG2Bitmap function, allowing memory manipulation and arbitrary code execution.
CVE-2005-3628 was reported in 2005 and poses security risks to systems using the affected software.