Vulnerability Description
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xpdf | Xpdf | All versions |
References
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatchVendor Advisory
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18385PatchVendor Advisory
- http://secunia.com/advisories/18387PatchVendor Advisory
- http://secunia.com/advisories/18389PatchVendor Advisory
- http://secunia.com/advisories/18398PatchVendor Advisory
- http://secunia.com/advisories/18407PatchVendor Advisory
- http://secunia.com/advisories/18416PatchVendor Advisory
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://secunia.com/advisories/18534PatchVendor Advisory
- http://secunia.com/advisories/18582PatchVendor Advisory
- http://secunia.com/advisories/18674
FAQ
What is CVE-2005-3628?
CVE-2005-3628 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers ...
How severe is CVE-2005-3628?
CVE-2005-3628 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3628?
Check the references section above for vendor advisories and patch information. Affected products include: Xpdf Xpdf.