CVE-2005-0064
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-07 20:57
Severity ?
Summary
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
References
cve@mitre.orgftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patchPatch
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921Patch, Vendor Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110625368019554&w=2
cve@mitre.orghttp://secunia.com/advisories/17277
cve@mitre.orghttp://www.debian.org/security/2005/dsa-645Patch, Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2005/dsa-648Patch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=186&type=vulnerabilitiesExploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:016
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:017
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:018
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:019
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:020
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:021
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-026.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-034.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-053.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-057.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-059.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-066.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2005/0003/Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2352Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2353Patch, Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781
cve@mitre.orghttps://security.gentoo.org/glsa/200501-28
cve@mitre.orghttps://security.gentoo.org/glsa/200502-10
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:40.988Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17277",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17277"
          },
          {
            "name": "oval:org.mitre.oval:def:11781",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781"
          },
          {
            "name": "RHSA-2005:066",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html"
          },
          {
            "name": "RHSA-2005:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-034.html"
          },
          {
            "name": "MDKSA-2005:018",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018"
          },
          {
            "name": "MDKSA-2005:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017"
          },
          {
            "name": "MDKSA-2005:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016"
          },
          {
            "name": "2005-0003",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2005/0003/"
          },
          {
            "name": "FLSA:2352",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352"
          },
          {
            "name": "FLSA:2353",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353"
          },
          {
            "name": "DSA-645",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-645"
          },
          {
            "name": "GLSA-200502-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/200502-10"
          },
          {
            "name": "RHSA-2005:026",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-026.html"
          },
          {
            "name": "RHSA-2005:053",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-053.html"
          },
          {
            "name": "MDKSA-2005:020",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020"
          },
          {
            "name": "GLSA-200501-28",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/200501-28"
          },
          {
            "name": "20050118 Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=186\u0026type=vulnerabilities"
          },
          {
            "name": "RHSA-2005:059",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-059.html"
          },
          {
            "name": "20050119 [USN-64-1] xpdf, CUPS vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110625368019554\u0026w=2"
          },
          {
            "name": "SCOSA-2005.42",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt"
          },
          {
            "name": "DSA-648",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-648"
          },
          {
            "name": "MDKSA-2005:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021"
          },
          {
            "name": "CLA-2005:921",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000921"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch"
          },
          {
            "name": "MDKSA-2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019"
          },
          {
            "name": "RHSA-2005:057",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-057.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17277",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17277"
        },
        {
          "name": "oval:org.mitre.oval:def:11781",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781"
        },
        {
          "name": "RHSA-2005:066",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html"
        },
        {
          "name": "RHSA-2005:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-034.html"
        },
        {
          "name": "MDKSA-2005:018",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018"
        },
        {
          "name": "MDKSA-2005:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017"
        },
        {
          "name": "MDKSA-2005:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016"
        },
        {
          "name": "2005-0003",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2005/0003/"
        },
        {
          "name": "FLSA:2352",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352"
        },
        {
          "name": "FLSA:2353",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353"
        },
        {
          "name": "DSA-645",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-645"
        },
        {
          "name": "GLSA-200502-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/200502-10"
        },
        {
          "name": "RHSA-2005:026",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-026.html"
        },
        {
          "name": "RHSA-2005:053",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-053.html"
        },
        {
          "name": "MDKSA-2005:020",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020"
        },
        {
          "name": "GLSA-200501-28",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/200501-28"
        },
        {
          "name": "20050118 Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=186\u0026type=vulnerabilities"
        },
        {
          "name": "RHSA-2005:059",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-059.html"
        },
        {
          "name": "20050119 [USN-64-1] xpdf, CUPS vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110625368019554\u0026w=2"
        },
        {
          "name": "SCOSA-2005.42",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt"
        },
        {
          "name": "DSA-648",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-648"
        },
        {
          "name": "MDKSA-2005:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021"
        },
        {
          "name": "CLA-2005:921",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000921"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch"
        },
        {
          "name": "MDKSA-2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019"
        },
        {
          "name": "RHSA-2005:057",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-057.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0064",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17277",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17277"
            },
            {
              "name": "oval:org.mitre.oval:def:11781",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781"
            },
            {
              "name": "RHSA-2005:066",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html"
            },
            {
              "name": "RHSA-2005:034",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-034.html"
            },
            {
              "name": "MDKSA-2005:018",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018"
            },
            {
              "name": "MDKSA-2005:017",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017"
            },
            {
              "name": "MDKSA-2005:016",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016"
            },
            {
              "name": "2005-0003",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2005/0003/"
            },
            {
              "name": "FLSA:2352",
              "refsource": "FEDORA",
              "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352"
            },
            {
              "name": "FLSA:2353",
              "refsource": "FEDORA",
              "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353"
            },
            {
              "name": "DSA-645",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-645"
            },
            {
              "name": "GLSA-200502-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/200502-10"
            },
            {
              "name": "RHSA-2005:026",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-026.html"
            },
            {
              "name": "RHSA-2005:053",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-053.html"
            },
            {
              "name": "MDKSA-2005:020",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020"
            },
            {
              "name": "GLSA-200501-28",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/200501-28"
            },
            {
              "name": "20050118 Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=186\u0026type=vulnerabilities"
            },
            {
              "name": "RHSA-2005:059",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-059.html"
            },
            {
              "name": "20050119 [USN-64-1] xpdf, CUPS vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110625368019554\u0026w=2"
            },
            {
              "name": "SCOSA-2005.42",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt"
            },
            {
              "name": "DSA-648",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-648"
            },
            {
              "name": "MDKSA-2005:021",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021"
            },
            {
              "name": "CLA-2005:921",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000921"
            },
            {
              "name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch"
            },
            {
              "name": "MDKSA-2005:019",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019"
            },
            {
              "name": "RHSA-2005:057",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-057.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0064",
    "datePublished": "2005-01-19T05:00:00",
    "dateReserved": "2005-01-13T00:00:00",
    "dateUpdated": "2024-08-07T20:57:40.988Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-0064\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2017-10-11T01:29:49.827\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D33C2A-E803-4575-B4CF-D5E484A22D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2A7B432-CDA1-472C-8FA4-30952A5A542D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DFDA2C-4518-4491-A8B5-DFD08997D2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB22C0B-E48E-4AD7-92BC-6DFB2D1F121C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A668276-7AE1-4395-90EE-E5A7B84657C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D90CF9-30BC-4F64-9A90-3B8160BB1737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172B87AF-5263-46CA-A9C2-AC08CCBC2960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F57D8D-E95C-4E80-B99C-475CB4D866F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756DDE44-2E0C-4209-ABBF-B9F73E4308C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CC6233-E207-40CC-81FF-A8670EEA4295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BB7E29-D56E-4B1B-ACFF-012B9B1E3187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E9AA00B-7910-426C-BA4F-56476C101E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25102E75-6D76-4DBF-B559-3C514B79D710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304E1E3-8766-40D0-8879-A652B4E9E72D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D8F3B8-255A-41BF-9A6D-8D44796FFC12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F432DC7-26C9-4645-B297-625F2D4C6F01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D5BC8E-8877-4277-BF7F-2021E9F20146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7DBEC5-478B-4AF5-ADC5-F95650DB90BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBC1A6C4-145B-49A4-A6B7-5DB9C8C5DF3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"188F1343-8082-4B54-8DA4-E344818ABD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4377ECA-92FE-4E39-B9F3-4220262CB989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3D4DA0-C4B0-4727-AADF-522A7C4ECA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC59A29-3F4E-4667-9966-E94F5FC3036D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95DA7DE-B786-4EE7-A3F4-C077A7986D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5306C05-4A71-4175-8C22-F2DE0F2FE4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354487CF-0086-4AE2-872B-0032E3EB89EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96767060-505A-42D2-A68A-6AD810DE800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1169B802-7279-437F-AF59-621A67DC92EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B93B3ED-AF82-49A9-8C7F-E5F652F19669\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000921\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110625368019554\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17277\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-645\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-648\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=186\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:016\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:018\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:019\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:020\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:021\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-026.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-034.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-053.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-057.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-059.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-066.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2005/0003/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2352\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2353\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/200501-28\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/200502-10\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.