10

CVE-2005-3625

Exploit

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Data is provided by the National Vulnerability Database (NVD)
Easy Software ProductsCups Version1.1.22
Easy Software ProductsCups Version1.1.22_rc1
Easy Software ProductsCups Version1.1.23
Easy Software ProductsCups Version1.1.23_rc1
KdeKdegraphics Version3.2
KdeKdegraphics Version3.4.3
KdeKoffice Version1.4
KdeKoffice Version1.4.1
KdeKoffice Version1.4.2
KdeKpdf Version3.2
KdeKpdf Version3.4.3
KdeKword Version1.4.2
PopplerPoppler Version0.4.2
SgiPropack Version3.0 Updatesp6
TetexTetex Version1.0.7
TetexTetex Version2.0
TetexTetex Version2.0.1
TetexTetex Version2.0.2
TetexTetex Version3.0
XpdfXpdf Version3.0
ConectivaLinux Version10.0
DebianDebian Linux Version3.0
DebianDebian Linux Version3.0 Editionalpha
DebianDebian Linux Version3.0 Editionarm
DebianDebian Linux Version3.0 Editionhppa
DebianDebian Linux Version3.0 Editionia-32
DebianDebian Linux Version3.0 Editionia-64
DebianDebian Linux Version3.0 Editionm68k
DebianDebian Linux Version3.0 Editionmips
DebianDebian Linux Version3.0 Editionmipsel
DebianDebian Linux Version3.0 Editionppc
DebianDebian Linux Version3.0 Editions-390
DebianDebian Linux Version3.0 Editionsparc
DebianDebian Linux Version3.1
DebianDebian Linux Version3.1 Editionalpha
DebianDebian Linux Version3.1 Editionamd64
DebianDebian Linux Version3.1 Editionarm
DebianDebian Linux Version3.1 Editionhppa
DebianDebian Linux Version3.1 Editionia-32
DebianDebian Linux Version3.1 Editionia-64
DebianDebian Linux Version3.1 Editionm68k
DebianDebian Linux Version3.1 Editionmips
DebianDebian Linux Version3.1 Editionmipsel
DebianDebian Linux Version3.1 Editionppc
DebianDebian Linux Version3.1 Editions-390
DebianDebian Linux Version3.1 Editionsparc
MandrakesoftMandrake Linux Version10.1
MandrakesoftMandrake Linux Version10.1 Editionx86-64
MandrakesoftMandrake Linux Version10.2
MandrakesoftMandrake Linux Version10.2 Editionx86-64
MandrakesoftMandrake Linux Version2006
MandrakesoftMandrake Linux Version2006 Editionx86-64
MandrakesoftMandrake Linux Corporate Server Version2.1 Editionx86_64
MandrakesoftMandrake Linux Corporate Server Version3.0 Editionx86_64
RedhatEnterprise Linux Version2.1 Editionadvanced_server
RedhatEnterprise Linux Version2.1 Editionadvanced_server_ia64
RedhatEnterprise Linux Version2.1 Editionenterprise_server
RedhatEnterprise Linux Version2.1 Editionenterprise_server_ia64
RedhatEnterprise Linux Version2.1 Editionworkstation
RedhatEnterprise Linux Version2.1 Editionworkstation_ia64
RedhatEnterprise Linux Version3.0 Editionadvanced_server
RedhatEnterprise Linux Version3.0 Editionenterprise_server
RedhatEnterprise Linux Version3.0 Editionworkstation_server
RedhatEnterprise Linux Version4.0 Editionadvanced_server
RedhatEnterprise Linux Version4.0 Editionenterprise_server
RedhatEnterprise Linux Version4.0 Editionworkstation
RedhatFedora Core Versioncore_1.0
RedhatFedora Core Versioncore_2.0
RedhatFedora Core Versioncore_3.0
RedhatFedora Core Versioncore_4.0
RedhatLinux Version7.3 Editioni386
RedhatLinux Version9.0 Editioni386
RedhatLinux Advanced Workstation Version2.1 Editionia64
RedhatLinux Advanced Workstation Version2.1 Editionitanium
ScoOpenserver Version5.0.7
ScoOpenserver Version6.0
SlackwareSlackware Linux Version9.0
SlackwareSlackware Linux Version9.1
SlackwareSlackware Linux Version10.0
SlackwareSlackware Linux Version10.1
SlackwareSlackware Linux Version10.2
SuseSuse Linux Version1.0
SuseSuse Linux Version9.0 Editionenterprise_server
SuseSuse Linux Version9.0 Editionpersonal
SuseSuse Linux Version9.0 Editionprofessional
SuseSuse Linux Version9.0 Editions_390
SuseSuse Linux Version9.0 Editionx86_64
SuseSuse Linux Version9.1 Editionpersonal
SuseSuse Linux Version9.1 Editionprofessional
SuseSuse Linux Version9.1 Editionx86_64
SuseSuse Linux Version9.2 Editionpersonal
SuseSuse Linux Version9.2 Editionprofessional
SuseSuse Linux Version9.2 Editionx86_64
SuseSuse Linux Version9.3 Editionpersonal
SuseSuse Linux Version9.3 Editionprofessional
SuseSuse Linux Version9.3 Editionx86_64
SuseSuse Linux Version10.0 Editionoss
SuseSuse Linux Version10.0 Editionprofessional
TrustixSecure Linux Version2.0
TrustixSecure Linux Version2.2
TrustixSecure Linux Version3.0
TurbolinuxTurbolinux Version10
TurbolinuxTurbolinux Versionfuji
TurbolinuxTurbolinux Appliance Server Version1.0_hosting_edition
TurbolinuxTurbolinux Appliance Server Version1.0_workgroup_edition
TurbolinuxTurbolinux Desktop Version10.0
TurbolinuxTurbolinux Server Version8.0
TurbolinuxTurbolinux Server Version10.0
TurbolinuxTurbolinux Server Version10.0_x86
UbuntuUbuntu Linux Version4.1 Editionia64
UbuntuUbuntu Linux Version4.1 Editionppc
UbuntuUbuntu Linux Version5.04 Editionamd64
UbuntuUbuntu Linux Version5.04 Editioni386
UbuntuUbuntu Linux Version5.04 Editionpowerpc
UbuntuUbuntu Linux Version5.10 Editionamd64
UbuntuUbuntu Linux Version5.10 Editioni386
UbuntuUbuntu Linux Version5.10 Editionpowerpc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 11.29% 0.929
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C