CVE-2006-0301

NameCVE-2006-0301
DescriptionHeap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1019-1, DSA-971-1, DSA-972-1, DSA-974-1, DSA-979-1, DSA-982-1, DSA-983-1, DSA-984-1, DSA-998-1
Debian Bugs350783, 350785

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libextractor (PTS)bullseye1:1.11-2fixed
bookworm1:1.11-7fixed
sid, trixie1:1.13-7fixed
poppler (PTS)bullseye (security), bullseye20.09.0-3.1+deb11u1fixed
bookworm22.12.0-2fixed
sid, trixie24.08.0-3fixed
xpdf (PTS)bullseye3.04+git20210103-3fixed
bookworm3.04+git20220601-1fixed
sid, trixie3.04+git20240613-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gpdfsourcesarge2.8.2-1.2sarge4DSA-982-1
gpdfsource(unstable)2.10.0-3medium
kdegraphicssource(unstable)4:3.5.1-2medium
kofficesourcesarge1.3.5-4.sarge.3DSA-1019-1
kofficesource(unstable)1.5.0-1medium
libextractorsourcesarge0.4.2-2sarge3DSA-998-1
libextractorsource(unstable)0.5.10-1medium
pdfkit.frameworksourcesarge0.8-2sarge3DSA-979-1
pdfkit.frameworksource(unstable)0.8-4medium
pdftohtmlsourcesarge0.36-11sarge2DSA-983-1
popplersource(unstable)0.4.5-1medium
swftoolssource(unstable)(not affected)
tetex-binsourcesarge(not affected)
tetex-binsource(unstable)3.0-12medium
xpdfsourcesarge3.00-13.6DSA-984-1
xpdfsource(unstable)3.01-6medium350783, 350785

Notes

[sarge] - tetex-bin <not-affected> (tetex2 uses an older version, which is not affected)
- swftools <not-affected> (splash/ is not included, therefore no vulnerable code)

Search for package or bug name: Reporting problems