First published: Mon Jan 30 2006(Updated: )
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xpdf |
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0301 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2006-0301, update to the latest version of Xpdf or any affected software that includes the security patch.
CVE-2006-0301 affects several software packages including Xpdf, poppler, kdegraphics, and gpdf.
Exploitation of CVE-2006-0301 could lead to a denial of service and the possibility of executing arbitrary code on the affected system.
To determine if your system is vulnerable to CVE-2006-0301, check if you are using an affected version of Xpdf or related software.