Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-931-1 | New xpdf packages fix arbitrary code execution |
Debian DSA |
DSA-932-1 | New kpdf packages fix arbitrary code execution |
Debian DSA |
DSA-936-1 | New libextractor packages fix arbitrary code execution |
Debian DSA |
DSA-937-1 | New tetex-bin packages fix arbitrary code execution |
Debian DSA |
DSA-938-1 | New koffice packages fix arbitrary code execution |
Debian DSA |
DSA-940-1 | New gpdf packages fix arbitrary code execution |
Debian DSA |
DSA-950-1 | New CUPS packages fix arbitrary code execution |
Debian DSA |
DSA-961-1 | New pdfkit.framework packages fix arbitrary code execution |
Debian DSA |
DSA-962-1 | New pdftohtml packages fix arbitrary code execution |
EUVD |
EUVD-2005-3625 | Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T23:17:23.423Z
Reserved: 2005-11-16T00:00:00
Link: CVE-2005-3628
No data.
Status : Deferred
Published: 2005-12-31T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-3628
OpenCVE Enrichment
No data.
Debian DSA
EUVD