Lucene search

K
nvd[email protected]NVD:CVE-2005-3625
HistoryDec 31, 2005 - 5:00 a.m.

CVE-2005-3625

2005-12-3105:00:00
CWE-399
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

78.7%

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka “Infinite CPU spins.”

Affected configurations

NVD
Node
easy_software_productscupsMatch1.1.22
OR
easy_software_productscupsMatch1.1.22_rc1
OR
easy_software_productscupsMatch1.1.23
OR
easy_software_productscupsMatch1.1.23_rc1
OR
kdekdegraphicsMatch3.2
OR
kdekdegraphicsMatch3.4.3
OR
kdekofficeMatch1.4
OR
kdekofficeMatch1.4.1
OR
kdekofficeMatch1.4.2
OR
kdekpdfMatch3.2
OR
kdekpdfMatch3.4.3
OR
kdekwordMatch1.4.2
OR
libextractorlibextractor
OR
popplerpopplerMatch0.4.2
OR
sgipropackMatch3.0sp6
OR
tetextetexMatch1.0.7
OR
tetextetexMatch2.0
OR
tetextetexMatch2.0.1
OR
tetextetexMatch2.0.2
OR
tetextetexMatch3.0
OR
xpdfxpdfMatch3.0
OR
conectivalinuxMatch10.0
Node
debiandebian_linuxMatch3.0
OR
debiandebian_linuxMatch3.0alpha
OR
debiandebian_linuxMatch3.0arm
OR
debiandebian_linuxMatch3.0hppa
OR
debiandebian_linuxMatch3.0ia-32
OR
debiandebian_linuxMatch3.0ia-64
OR
debiandebian_linuxMatch3.0m68k
OR
debiandebian_linuxMatch3.0mips
OR
debiandebian_linuxMatch3.0mipsel
OR
debiandebian_linuxMatch3.0ppc
OR
debiandebian_linuxMatch3.0s-390
OR
debiandebian_linuxMatch3.0sparc
OR
debiandebian_linuxMatch3.1
OR
debiandebian_linuxMatch3.1alpha
OR
debiandebian_linuxMatch3.1amd64
OR
debiandebian_linuxMatch3.1arm
OR
debiandebian_linuxMatch3.1hppa
OR
debiandebian_linuxMatch3.1ia-32
OR
debiandebian_linuxMatch3.1ia-64
OR
debiandebian_linuxMatch3.1m68k
OR
debiandebian_linuxMatch3.1mips
OR
debiandebian_linuxMatch3.1mipsel
OR
debiandebian_linuxMatch3.1ppc
OR
debiandebian_linuxMatch3.1s-390
OR
debiandebian_linuxMatch3.1sparc
OR
gentoolinux
OR
mandrakesoftmandrake_linuxMatch10.1
OR
mandrakesoftmandrake_linuxMatch10.1x86-64
OR
mandrakesoftmandrake_linuxMatch10.2
OR
mandrakesoftmandrake_linuxMatch10.2x86-64
OR
mandrakesoftmandrake_linuxMatch2006
OR
mandrakesoftmandrake_linuxMatch2006x86-64
OR
mandrakesoftmandrake_linux_corporate_serverMatch2.1
OR
mandrakesoftmandrake_linux_corporate_serverMatch2.1x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0x86_64
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_server
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation_server
OR
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatenterprise_linux_desktopMatch4.0
OR
redhatfedora_coreMatchcore_1.0
OR
redhatfedora_coreMatchcore_2.0
OR
redhatfedora_coreMatchcore_3.0
OR
redhatfedora_coreMatchcore_4.0
OR
redhatlinuxMatch7.3i386
OR
redhatlinuxMatch9.0i386
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium
OR
scoopenserverMatch5.0.7
OR
scoopenserverMatch6.0
OR
slackwareslackware_linuxMatch9.0
OR
slackwareslackware_linuxMatch9.1
OR
slackwareslackware_linuxMatch10.0
OR
slackwareslackware_linuxMatch10.1
OR
slackwareslackware_linuxMatch10.2
OR
susesuse_linuxMatch1.0
OR
susesuse_linuxMatch9.0enterprise_server
OR
susesuse_linuxMatch9.0personal
OR
susesuse_linuxMatch9.0professional
OR
susesuse_linuxMatch9.0s_390
OR
susesuse_linuxMatch9.0x86_64
OR
susesuse_linuxMatch9.1personal
OR
susesuse_linuxMatch9.1professional
OR
susesuse_linuxMatch9.1x86_64
OR
susesuse_linuxMatch9.2personal
OR
susesuse_linuxMatch9.2professional
OR
susesuse_linuxMatch9.2x86_64
OR
susesuse_linuxMatch9.3personal
OR
susesuse_linuxMatch9.3professional
OR
susesuse_linuxMatch9.3x86_64
OR
susesuse_linuxMatch10.0oss
OR
susesuse_linuxMatch10.0professional
OR
trustixsecure_linuxMatch2.0
OR
trustixsecure_linuxMatch2.2
OR
trustixsecure_linuxMatch3.0
OR
turbolinuxturbolinuxMatch10
OR
turbolinuxturbolinuxMatchfuji
OR
turbolinuxturbolinux_appliance_serverMatch1.0_hosting_edition
OR
turbolinuxturbolinux_appliance_serverMatch1.0_workgroup_edition
OR
turbolinuxturbolinux_desktopMatch10.0
OR
turbolinuxturbolinux_home
OR
turbolinuxturbolinux_multimedia
OR
turbolinuxturbolinux_personal
OR
turbolinuxturbolinux_serverMatch8.0
OR
turbolinuxturbolinux_serverMatch10.0
OR
turbolinuxturbolinux_serverMatch10.0_x86
OR
turbolinuxturbolinux_workstationMatch8.0
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc
OR
ubuntuubuntu_linuxMatch5.04amd64
OR
ubuntuubuntu_linuxMatch5.04i386
OR
ubuntuubuntu_linuxMatch5.04powerpc
OR
ubuntuubuntu_linuxMatch5.10amd64
OR
ubuntuubuntu_linuxMatch5.10i386
OR
ubuntuubuntu_linuxMatch5.10powerpc

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

78.7%