CVE-2005-3191
Vulnerability from cvelistv5
Published
2005-12-07 01:00
Modified
2024-08-07 23:01
Severity ?
Summary
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
cve@mitre.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2005-868.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17897Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17908Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17912Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17916Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17920Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17921Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17926Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17929Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17940Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17955
cve@mitre.orghttp://secunia.com/advisories/17976Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18055Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18061Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18147
cve@mitre.orghttp://secunia.com/advisories/18189Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18191Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18192Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18303
cve@mitre.orghttp://secunia.com/advisories/18313Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18336Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18349Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18380
cve@mitre.orghttp://secunia.com/advisories/18385Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18387Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18389
cve@mitre.orghttp://secunia.com/advisories/18398
cve@mitre.orghttp://secunia.com/advisories/18407
cve@mitre.orghttp://secunia.com/advisories/18416Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18428
cve@mitre.orghttp://secunia.com/advisories/18436
cve@mitre.orghttp://secunia.com/advisories/18448
cve@mitre.orghttp://secunia.com/advisories/18503
cve@mitre.orghttp://secunia.com/advisories/18517
cve@mitre.orghttp://secunia.com/advisories/18534
cve@mitre.orghttp://secunia.com/advisories/18549
cve@mitre.orghttp://secunia.com/advisories/18554
cve@mitre.orghttp://secunia.com/advisories/18582
cve@mitre.orghttp://secunia.com/advisories/18674
cve@mitre.orghttp://secunia.com/advisories/18675
cve@mitre.orghttp://secunia.com/advisories/18679
cve@mitre.orghttp://secunia.com/advisories/18908
cve@mitre.orghttp://secunia.com/advisories/18913
cve@mitre.orghttp://secunia.com/advisories/19230
cve@mitre.orghttp://secunia.com/advisories/19377
cve@mitre.orghttp://secunia.com/advisories/19797
cve@mitre.orghttp://secunia.com/advisories/19798
cve@mitre.orghttp://secunia.com/advisories/25729
cve@mitre.orghttp://secunia.com/advisories/26413
cve@mitre.orghttp://securityreason.com/securityalert/233
cve@mitre.orghttp://securityreason.com/securityalert/234
cve@mitre.orghttp://securitytracker.com/id?1015309
cve@mitre.orghttp://securitytracker.com/id?1015324
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-931
cve@mitre.orghttp://www.debian.org/security/2005/dsa-932
cve@mitre.orghttp://www.debian.org/security/2005/dsa-937
cve@mitre.orghttp://www.debian.org/security/2005/dsa-938
cve@mitre.orghttp://www.debian.org/security/2005/dsa-940
cve@mitre.orghttp://www.debian.org/security/2006/dsa-936
cve@mitre.orghttp://www.debian.org/security/2006/dsa-950
cve@mitre.orghttp://www.debian.org/security/2006/dsa-961
cve@mitre.orghttp://www.debian.org/security/2006/dsa-962
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=342&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=343&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.kde.org/info/security/advisory-20051207-1.txt
cve@mitre.orghttp://www.kde.org/info/security/advisory-20051207-2.txt
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:003
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:004
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:005
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:006
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:008
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:010
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:011
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:012
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_29_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_02_sr.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-840.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-867.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-878.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0160.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/418883/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/427053/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/427990/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/15726
cve@mitre.orghttp://www.securityfocus.com/bid/15727
cve@mitre.orghttp://www.trustix.org/errata/2005/0072/
cve@mitre.orghttp://www.ubuntulinux.org/usn/usn-227-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2786
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2787
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2788
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2789
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2790
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2856
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2280
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23443
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23444
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1609
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:58.841Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "234",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/234"
          },
          {
            "name": "17929",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17929"
          },
          {
            "name": "19797",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19797"
          },
          {
            "name": "SCOSA-2006.20",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
          },
          {
            "name": "233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/233"
          },
          {
            "name": "DSA-932",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-932"
          },
          {
            "name": "18349",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18349"
          },
          {
            "name": "18147",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18147"
          },
          {
            "name": "SCOSA-2006.15",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
          },
          {
            "name": "18055",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18055"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
          },
          {
            "name": "18503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18503"
          },
          {
            "name": "18549",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18549"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
          },
          {
            "name": "18679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18679"
          },
          {
            "name": "18189",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18189"
          },
          {
            "name": "26413",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26413"
          },
          {
            "name": "17940",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17940"
          },
          {
            "name": "oval:org.mitre.oval:def:9760",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"
          },
          {
            "name": "xpdf-dctstream-baseline-bo(23444)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"
          },
          {
            "name": "18303",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18303"
          },
          {
            "name": "DSA-931",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-931"
          },
          {
            "name": "18554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18554"
          },
          {
            "name": "MDKSA-2006:003",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"
          },
          {
            "name": "19230",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19230"
          },
          {
            "name": "102972",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
          },
          {
            "name": "MDKSA-2006:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
          },
          {
            "name": "DSA-962",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-962"
          },
          {
            "name": "1015309",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015309"
          },
          {
            "name": "DSA-937",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-937"
          },
          {
            "name": "18398",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18398"
          },
          {
            "name": "FLSA-2006:176751",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
          },
          {
            "name": "SUSE-SA:2006:001",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
          },
          {
            "name": "DSA-936",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-936"
          },
          {
            "name": "17916",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17916"
          },
          {
            "name": "20051205 Multiple Vendor xpdf DCTStream Progressive Heap Overflow",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities"
          },
          {
            "name": "RHSA-2005:840",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
          },
          {
            "name": "ADV-2005-2789",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2789"
          },
          {
            "name": "RHSA-2005:867",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
          },
          {
            "name": "18674",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18674"
          },
          {
            "name": "MDKSA-2006:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
          },
          {
            "name": "18313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18313"
          },
          {
            "name": "15727",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15727"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1609"
          },
          {
            "name": "RHSA-2005:868",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
          },
          {
            "name": "20051201-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
          },
          {
            "name": "20060101-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
          },
          {
            "name": "18448",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18448"
          },
          {
            "name": "18436",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18436"
          },
          {
            "name": "18428",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18428"
          },
          {
            "name": "18380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18380"
          },
          {
            "name": "GLSA-200512-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
          },
          {
            "name": "FEDORA-2005-1126",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
          },
          {
            "name": "18416",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18416"
          },
          {
            "name": "ADV-2007-2280",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2280"
          },
          {
            "name": "15726",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15726"
          },
          {
            "name": "GLSA-200601-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
          },
          {
            "name": "FEDORA-2005-1142",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
          },
          {
            "name": "18336",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18336"
          },
          {
            "name": "18061",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18061"
          },
          {
            "name": "18407",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18407"
          },
          {
            "name": "18009",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18009"
          },
          {
            "name": "17908",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17908"
          },
          {
            "name": "USN-227-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntulinux.org/usn/usn-227-1"
          },
          {
            "name": "17897",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17897"
          },
          {
            "name": "Multiple Vendor xpdf DCTStream Baseline Heap Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities"
          },
          {
            "name": "18517",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18517"
          },
          {
            "name": "18582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18582"
          },
          {
            "name": "SUSE-SR:2006:002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html"
          },
          {
            "name": "18534",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18534"
          },
          {
            "name": "SSA:2006-045-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683"
          },
          {
            "name": "TSLSA-2005-0072",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2005/0072/"
          },
          {
            "name": "FEDORA-2005-1127",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
          },
          {
            "name": "20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
          },
          {
            "name": "xpdf-dctstream-progressive-bo(23443)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"
          },
          {
            "name": "18908",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18908"
          },
          {
            "name": "25729",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25729"
          },
          {
            "name": "ADV-2005-2786",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2786"
          },
          {
            "name": "MDKSA-2006:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
          },
          {
            "name": "ADV-2005-2788",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2788"
          },
          {
            "name": "17926",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17926"
          },
          {
            "name": "19798",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19798"
          },
          {
            "name": "MDKSA-2006:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
          },
          {
            "name": "18191",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18191"
          },
          {
            "name": "20060201-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
          },
          {
            "name": "RHSA-2006:0160",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
          },
          {
            "name": "17912",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17912"
          },
          {
            "name": "MDKSA-2006:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
          },
          {
            "name": "17921",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17921"
          },
          {
            "name": "DSA-940",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-940"
          },
          {
            "name": "MDKSA-2006:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
          },
          {
            "name": "ADV-2005-2790",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2790"
          },
          {
            "name": "18389",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18389"
          },
          {
            "name": "18192",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18192"
          },
          {
            "name": "ADV-2005-2856",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2856"
          },
          {
            "name": "SSA:2006-045-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747"
          },
          {
            "name": "19377",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19377"
          },
          {
            "name": "FLSA:175404",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
          },
          {
            "name": "DSA-961",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-961"
          },
          {
            "name": "SCOSA-2006.21",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
          },
          {
            "name": "18675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18675"
          },
          {
            "name": "1015324",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015324"
          },
          {
            "name": "18913",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18913"
          },
          {
            "name": "DSA-938",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-938"
          },
          {
            "name": "SUSE-SR:2005:029",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
          },
          {
            "name": "ADV-2005-2787",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2787"
          },
          {
            "name": "RHSA-2005:878",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
          },
          {
            "name": "FEDORA-2005-1141",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
          },
          {
            "name": "17920",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17920"
          },
          {
            "name": "DSA-950",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-950"
          },
          {
            "name": "17955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17955"
          },
          {
            "name": "17976",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17976"
          },
          {
            "name": "18387",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18387"
          },
          {
            "name": "MDKSA-2006:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
          },
          {
            "name": "18385",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18385"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "234",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/234"
        },
        {
          "name": "17929",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17929"
        },
        {
          "name": "19797",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19797"
        },
        {
          "name": "SCOSA-2006.20",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
        },
        {
          "name": "233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/233"
        },
        {
          "name": "DSA-932",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-932"
        },
        {
          "name": "18349",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18349"
        },
        {
          "name": "18147",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18147"
        },
        {
          "name": "SCOSA-2006.15",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
        },
        {
          "name": "18055",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18055"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
        },
        {
          "name": "18503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18503"
        },
        {
          "name": "18549",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18549"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
        },
        {
          "name": "18679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18679"
        },
        {
          "name": "18189",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18189"
        },
        {
          "name": "26413",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26413"
        },
        {
          "name": "17940",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17940"
        },
        {
          "name": "oval:org.mitre.oval:def:9760",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"
        },
        {
          "name": "xpdf-dctstream-baseline-bo(23444)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"
        },
        {
          "name": "18303",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18303"
        },
        {
          "name": "DSA-931",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-931"
        },
        {
          "name": "18554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18554"
        },
        {
          "name": "MDKSA-2006:003",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"
        },
        {
          "name": "19230",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19230"
        },
        {
          "name": "102972",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
        },
        {
          "name": "MDKSA-2006:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
        },
        {
          "name": "DSA-962",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-962"
        },
        {
          "name": "1015309",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015309"
        },
        {
          "name": "DSA-937",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-937"
        },
        {
          "name": "18398",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18398"
        },
        {
          "name": "FLSA-2006:176751",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
        },
        {
          "name": "SUSE-SA:2006:001",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
        },
        {
          "name": "DSA-936",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-936"
        },
        {
          "name": "17916",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17916"
        },
        {
          "name": "20051205 Multiple Vendor xpdf DCTStream Progressive Heap Overflow",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities"
        },
        {
          "name": "RHSA-2005:840",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
        },
        {
          "name": "ADV-2005-2789",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2789"
        },
        {
          "name": "RHSA-2005:867",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
        },
        {
          "name": "18674",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18674"
        },
        {
          "name": "MDKSA-2006:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
        },
        {
          "name": "18313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18313"
        },
        {
          "name": "15727",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15727"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1609"
        },
        {
          "name": "RHSA-2005:868",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
        },
        {
          "name": "20051201-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
        },
        {
          "name": "20060101-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
        },
        {
          "name": "18448",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18448"
        },
        {
          "name": "18436",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18436"
        },
        {
          "name": "18428",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18428"
        },
        {
          "name": "18380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18380"
        },
        {
          "name": "GLSA-200512-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
        },
        {
          "name": "FEDORA-2005-1126",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
        },
        {
          "name": "18416",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18416"
        },
        {
          "name": "ADV-2007-2280",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2280"
        },
        {
          "name": "15726",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15726"
        },
        {
          "name": "GLSA-200601-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
        },
        {
          "name": "FEDORA-2005-1142",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
        },
        {
          "name": "18336",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18336"
        },
        {
          "name": "18061",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18061"
        },
        {
          "name": "18407",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18407"
        },
        {
          "name": "18009",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18009"
        },
        {
          "name": "17908",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17908"
        },
        {
          "name": "USN-227-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntulinux.org/usn/usn-227-1"
        },
        {
          "name": "17897",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17897"
        },
        {
          "name": "Multiple Vendor xpdf DCTStream Baseline Heap Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities"
        },
        {
          "name": "18517",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18517"
        },
        {
          "name": "18582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18582"
        },
        {
          "name": "SUSE-SR:2006:002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html"
        },
        {
          "name": "18534",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18534"
        },
        {
          "name": "SSA:2006-045-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683"
        },
        {
          "name": "TSLSA-2005-0072",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2005/0072/"
        },
        {
          "name": "FEDORA-2005-1127",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
        },
        {
          "name": "20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
        },
        {
          "name": "xpdf-dctstream-progressive-bo(23443)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"
        },
        {
          "name": "18908",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18908"
        },
        {
          "name": "25729",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25729"
        },
        {
          "name": "ADV-2005-2786",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2786"
        },
        {
          "name": "MDKSA-2006:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
        },
        {
          "name": "ADV-2005-2788",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2788"
        },
        {
          "name": "17926",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17926"
        },
        {
          "name": "19798",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19798"
        },
        {
          "name": "MDKSA-2006:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
        },
        {
          "name": "18191",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18191"
        },
        {
          "name": "20060201-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
        },
        {
          "name": "RHSA-2006:0160",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
        },
        {
          "name": "17912",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17912"
        },
        {
          "name": "MDKSA-2006:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
        },
        {
          "name": "17921",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17921"
        },
        {
          "name": "DSA-940",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-940"
        },
        {
          "name": "MDKSA-2006:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
        },
        {
          "name": "ADV-2005-2790",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2790"
        },
        {
          "name": "18389",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18389"
        },
        {
          "name": "18192",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18192"
        },
        {
          "name": "ADV-2005-2856",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2856"
        },
        {
          "name": "SSA:2006-045-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747"
        },
        {
          "name": "19377",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19377"
        },
        {
          "name": "FLSA:175404",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
        },
        {
          "name": "DSA-961",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-961"
        },
        {
          "name": "SCOSA-2006.21",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
        },
        {
          "name": "18675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18675"
        },
        {
          "name": "1015324",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015324"
        },
        {
          "name": "18913",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18913"
        },
        {
          "name": "DSA-938",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-938"
        },
        {
          "name": "SUSE-SR:2005:029",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
        },
        {
          "name": "ADV-2005-2787",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2787"
        },
        {
          "name": "RHSA-2005:878",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
        },
        {
          "name": "FEDORA-2005-1141",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
        },
        {
          "name": "17920",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17920"
        },
        {
          "name": "DSA-950",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-950"
        },
        {
          "name": "17955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17955"
        },
        {
          "name": "17976",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17976"
        },
        {
          "name": "18387",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18387"
        },
        {
          "name": "MDKSA-2006:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
        },
        {
          "name": "18385",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18385"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3191",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "234",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/234"
            },
            {
              "name": "17929",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17929"
            },
            {
              "name": "19797",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19797"
            },
            {
              "name": "SCOSA-2006.20",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
            },
            {
              "name": "233",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/233"
            },
            {
              "name": "DSA-932",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-932"
            },
            {
              "name": "18349",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18349"
            },
            {
              "name": "18147",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18147"
            },
            {
              "name": "SCOSA-2006.15",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
            },
            {
              "name": "18055",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18055"
            },
            {
              "name": "http://www.kde.org/info/security/advisory-20051207-1.txt",
              "refsource": "CONFIRM",
              "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
            },
            {
              "name": "18503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18503"
            },
            {
              "name": "18549",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18549"
            },
            {
              "name": "http://www.kde.org/info/security/advisory-20051207-2.txt",
              "refsource": "CONFIRM",
              "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
            },
            {
              "name": "18679",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18679"
            },
            {
              "name": "18189",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18189"
            },
            {
              "name": "26413",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26413"
            },
            {
              "name": "17940",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17940"
            },
            {
              "name": "oval:org.mitre.oval:def:9760",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"
            },
            {
              "name": "xpdf-dctstream-baseline-bo(23444)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"
            },
            {
              "name": "18303",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18303"
            },
            {
              "name": "DSA-931",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-931"
            },
            {
              "name": "18554",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18554"
            },
            {
              "name": "MDKSA-2006:003",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"
            },
            {
              "name": "19230",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19230"
            },
            {
              "name": "102972",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
            },
            {
              "name": "MDKSA-2006:012",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
            },
            {
              "name": "DSA-962",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-962"
            },
            {
              "name": "1015309",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015309"
            },
            {
              "name": "DSA-937",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-937"
            },
            {
              "name": "18398",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18398"
            },
            {
              "name": "FLSA-2006:176751",
              "refsource": "FEDORA",
              "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
            },
            {
              "name": "SUSE-SA:2006:001",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
            },
            {
              "name": "DSA-936",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-936"
            },
            {
              "name": "17916",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17916"
            },
            {
              "name": "20051205 Multiple Vendor xpdf DCTStream Progressive Heap Overflow",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities"
            },
            {
              "name": "RHSA-2005:840",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
            },
            {
              "name": "ADV-2005-2789",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2789"
            },
            {
              "name": "RHSA-2005:867",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
            },
            {
              "name": "18674",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18674"
            },
            {
              "name": "MDKSA-2006:005",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
            },
            {
              "name": "18313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18313"
            },
            {
              "name": "15727",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15727"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1609",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1609"
            },
            {
              "name": "RHSA-2005:868",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
            },
            {
              "name": "20051201-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
            },
            {
              "name": "20060101-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
            },
            {
              "name": "18448",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18448"
            },
            {
              "name": "18436",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18436"
            },
            {
              "name": "18428",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18428"
            },
            {
              "name": "18380",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18380"
            },
            {
              "name": "GLSA-200512-08",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
            },
            {
              "name": "FEDORA-2005-1126",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
            },
            {
              "name": "18416",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18416"
            },
            {
              "name": "ADV-2007-2280",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2280"
            },
            {
              "name": "15726",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15726"
            },
            {
              "name": "GLSA-200601-02",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
            },
            {
              "name": "FEDORA-2005-1142",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
            },
            {
              "name": "18336",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18336"
            },
            {
              "name": "18061",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18061"
            },
            {
              "name": "18407",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18407"
            },
            {
              "name": "18009",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18009"
            },
            {
              "name": "17908",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17908"
            },
            {
              "name": "USN-227-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntulinux.org/usn/usn-227-1"
            },
            {
              "name": "17897",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17897"
            },
            {
              "name": "Multiple Vendor xpdf DCTStream Baseline Heap Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities"
            },
            {
              "name": "18517",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18517"
            },
            {
              "name": "18582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18582"
            },
            {
              "name": "SUSE-SR:2006:002",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html"
            },
            {
              "name": "18534",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18534"
            },
            {
              "name": "SSA:2006-045-09",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683"
            },
            {
              "name": "TSLSA-2005-0072",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2005/0072/"
            },
            {
              "name": "FEDORA-2005-1127",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
            },
            {
              "name": "20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
            },
            {
              "name": "xpdf-dctstream-progressive-bo(23443)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"
            },
            {
              "name": "18908",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18908"
            },
            {
              "name": "25729",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25729"
            },
            {
              "name": "ADV-2005-2786",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2786"
            },
            {
              "name": "MDKSA-2006:006",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
            },
            {
              "name": "ADV-2005-2788",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2788"
            },
            {
              "name": "17926",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17926"
            },
            {
              "name": "19798",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19798"
            },
            {
              "name": "MDKSA-2006:008",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
            },
            {
              "name": "18191",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18191"
            },
            {
              "name": "20060201-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
            },
            {
              "name": "RHSA-2006:0160",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
            },
            {
              "name": "17912",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17912"
            },
            {
              "name": "MDKSA-2006:010",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
            },
            {
              "name": "17921",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17921"
            },
            {
              "name": "DSA-940",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-940"
            },
            {
              "name": "MDKSA-2006:004",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
            },
            {
              "name": "ADV-2005-2790",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2790"
            },
            {
              "name": "18389",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18389"
            },
            {
              "name": "18192",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18192"
            },
            {
              "name": "ADV-2005-2856",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2856"
            },
            {
              "name": "SSA:2006-045-04",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747"
            },
            {
              "name": "19377",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19377"
            },
            {
              "name": "FLSA:175404",
              "refsource": "FEDORA",
              "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
            },
            {
              "name": "DSA-961",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-961"
            },
            {
              "name": "SCOSA-2006.21",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
            },
            {
              "name": "18675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18675"
            },
            {
              "name": "1015324",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015324"
            },
            {
              "name": "18913",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18913"
            },
            {
              "name": "DSA-938",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-938"
            },
            {
              "name": "SUSE-SR:2005:029",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
            },
            {
              "name": "ADV-2005-2787",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2787"
            },
            {
              "name": "RHSA-2005:878",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
            },
            {
              "name": "FEDORA-2005-1141",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
            },
            {
              "name": "17920",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17920"
            },
            {
              "name": "DSA-950",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-950"
            },
            {
              "name": "17955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17955"
            },
            {
              "name": "17976",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17976"
            },
            {
              "name": "18387",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18387"
            },
            {
              "name": "MDKSA-2006:011",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
            },
            {
              "name": "18385",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18385"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3191",
    "datePublished": "2005-12-07T01:00:00",
    "dateReserved": "2005-10-14T00:00:00",
    "dateUpdated": "2024-08-07T23:01:58.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-3191\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-07T01:03:00.000\",\"lastModified\":\"2018-10-19T15:34:50.927\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.1},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CC6233-E207-40CC-81FF-A8670EEA4295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304E1E3-8766-40D0-8879-A652B4E9E72D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"188F1343-8082-4B54-8DA4-E344818ABD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95DA7DE-B786-4EE7-A3F4-C077A7986D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5306C05-4A71-4175-8C22-F2DE0F2FE4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354487CF-0086-4AE2-872B-0032E3EB89EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96767060-505A-42D2-A68A-6AD810DE800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1169B802-7279-437F-AF59-621A67DC92EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B93B3ED-AF82-49A9-8C7F-E5F652F19669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B77866E-6818-4DE6-9457-39416871952C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6D23CF8-2B6C-4D2A-8E5E-6AACE99A7C19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9107B531-7254-4908-97F0-3BF1EA0495AC\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-868.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17897\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17908\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17912\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17916\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17920\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17921\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17926\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17929\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17940\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17955\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17976\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18009\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18055\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18061\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18147\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18189\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18191\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18192\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18303\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18313\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18336\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18349\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18380\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18385\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18387\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18389\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18398\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18407\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18416\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18428\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18436\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18448\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18517\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18534\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18549\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18554\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18582\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18674\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18675\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18679\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18908\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18913\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19230\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19377\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19797\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19798\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25729\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26413\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/233\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/234\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015309\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015324\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.472683\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.474747\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-931\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-932\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-937\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-938\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-940\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-936\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-950\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-961\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-962\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.idefense.com/application/poi/display?id=342\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=343\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kde.org/info/security/advisory-20051207-1.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kde.org/info/security/advisory-20051207-2.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_29_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_02_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-840.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-867.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-878.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0160.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/418883/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/427053/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/427990/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15726\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15727\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.org/errata/2005/0072/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntulinux.org/usn/usn-227-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2786\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2787\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2788\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2789\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2790\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2856\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2280\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/23443\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/23444\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1609\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.