CVE-2005-3193

NameCVE-2005-3193
DescriptionHeap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-931-1, DSA-932-1, DSA-936-1, DSA-937-1, DSA-950-1, DSA-961-1, DSA-979-1, DSA-982-1, DSA-984-1, DTSA-28-1
NVD severitymedium (attack range: remote, user-initiated)
Debian Bugs342281, 342286, 342287, 342288, 342292, 342337
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cups (PTS)squeeze1.4.4-7+squeeze5fixed
squeeze (security)1.4.4-7+squeeze4fixed
squeeze (lts)1.4.4-7+squeeze9fixed
wheezy1.5.3-5+deb7u4fixed
wheezy (security)1.5.3-5+deb7u6fixed
jessie1.7.5-11fixed
jessie (security)1.7.5-11+deb8u1fixed
stretch, sid2.0.3-10fixed
kdegraphics (PTS)squeeze4:4.4.5-2fixed
koffice (PTS)squeeze1:2.2.1-4fixed
libextractor (PTS)squeeze1:0.5.23+dfsg-7fixed
wheezy1:0.6.3-5fixed
stretch, sid, jessie1:1.3-2fixed
poppler (PTS)squeeze, squeeze (security)0.12.4-1.2+squeeze3fixed
squeeze (lts)0.12.4-1.2+squeeze4fixed
wheezy0.18.4-6fixed
jessie0.26.5-2fixed
stretch, sid0.26.5-3fixed
xpdf (PTS)squeeze3.02-12+squeeze1fixed
wheezy3.03-10fixed
stretch, sid, jessie3.03-17fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cupssource(unstable)1.1.23-13unimportant
cupsyssource(unstable)1.1.23-13unimportant
cupsyssourcesarge(not affected)DSA-950-1
cupsyssourcewoody1.1.14-5woody14mediumDSA-950-1
gpdfsource(unstable)2.10.0-1medium342286
gpdfsourceetch2.10.0-1+etch1mediumDTSA-28-1
gpdfsourcesarge2.8.2-1.2sarge4mediumDSA-982-1
kdegraphicssource(unstable)4:3.4.3-4medium342287
kdegraphicssourcesarge4:3.3.2-2sarge3mediumDSA-932-1
kofficesource(unstable)(not affected)
libextractorsource(unstable)0.5.8-1medium
libextractorsourcesarge0.4.2-2sarge2mediumDSA-936-1
pdfkit.frameworksource(unstable)0.8-4medium
pdfkit.frameworksourcesarge0.8-2sarge3mediumDSA-979-1
pdftohtmlsource(unstable)(not affected)
popplersource(unstable)0.4.2-1.1medium342288
tetex-binsource(unstable)3.0-11medium342292
tetex-binsourcesarge2.0.2-30sarge4mediumDSA-937-1
tetex-binsourcewoody1.0.7+20011202-7.7mediumDSA-937-1
xpdfsource(unstable)3.01-3medium342281, 342337
xpdfsourcesarge3.00-13.6mediumDSA-984-1
xpdfsourcewoody1.00-3.8mediumDSA-931-1

Notes

- pdftohtml <not-affected> (Vulnerable xpdf code not contained)
Previous kdegraphics fix was incomplete
- koffice <not-affected> (Vulnerable xpdf code not contained)

Search for package or bug name: Reporting problems