Vulnerability Details : CVE-2005-3192
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3192
Probability of exploitation activity in the next 30 days: 18.41%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-3192
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2005-3192
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://www.kde.org/info/security/advisory-20051207-1.txt
- http://www.novell.com/linux/security/advisories/2006_02_sr.html
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
- http://www.vupen.com/english/advisories/2005/2788
- http://www.vupen.com/english/advisories/2007/2280
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
-
http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
Patch;Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.debian.org/security/2006/dsa-950
-
ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch
Patch
- http://www.debian.org/security/2006/dsa-962
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.securityfocus.com/archive/1/418883/100/0/threaded
- http://securitytracker.com/id?1015324
- http://www.debian.org/security/2006/dsa-961
-
http://www.securityfocus.com/bid/15725
Patch
-
http://www.redhat.com/support/errata/RHSA-2005-840.html
Patch;Vendor Advisory
- https://issues.rpath.com/browse/RPL-1609
- http://www.vupen.com/english/advisories/2005/2787
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
-
http://rhn.redhat.com/errata/RHSA-2005-868.html
Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- http://www.debian.org/security/2006/dsa-936
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
-
http://www.redhat.com/support/errata/RHSA-2005-878.html
Vendor Advisory
- http://www.vupen.com/english/advisories/2005/2790
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://securitytracker.com/id?1015309
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
-
http://securityreason.com/securityalert/235
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
-
http://securityreason.com/securityalert/240
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
-
http://www.debian.org/security/2006/dsa-937
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://www.novell.com/linux/security/advisories/2005_29_sr.html
-
http://www.redhat.com/support/errata/RHSA-2005-867.html
Vendor Advisory
- http://www.kde.org/info/security/advisory-20051207-2.txt
-
http://www.vupen.com/english/advisories/2005/2755
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
- http://www.vupen.com/english/advisories/2005/2789
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
- http://www.trustix.org/errata/2005/0072/
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.vupen.com/english/advisories/2005/2856
- http://www.vupen.com/english/advisories/2005/2786
- http://www.ubuntulinux.org/usn/usn-227-1
- cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*