CVE-2005-3627

N/A Unknown
Published: December 31, 2005 Modified: April 16, 2026
View on NVD

Description

Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0177.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://scary.beasts.org/security/CESA-2005-003.txt
Source: secalert@redhat.com
Exploit Vendor Advisory
http://secunia.com/advisories/18147
Source: secalert@redhat.com
http://secunia.com/advisories/18303
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18312
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18313
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18329
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18332
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18334
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18335
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18338
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18349
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18373
Source: secalert@redhat.com
http://secunia.com/advisories/18375
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18380
Source: secalert@redhat.com
http://secunia.com/advisories/18385
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18387
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18389
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18398
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18407
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18414
Source: secalert@redhat.com
http://secunia.com/advisories/18416
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18423
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18425
Source: secalert@redhat.com
http://secunia.com/advisories/18428
Source: secalert@redhat.com
http://secunia.com/advisories/18436
Source: secalert@redhat.com
http://secunia.com/advisories/18448
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18463
Source: secalert@redhat.com
http://secunia.com/advisories/18517
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18534
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18554
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18582
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/18642
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18644
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18674
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18675
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18679
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18908
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/18913
Source: secalert@redhat.com
http://secunia.com/advisories/19230
Source: secalert@redhat.com
http://secunia.com/advisories/19377
Source: secalert@redhat.com
http://secunia.com/advisories/25729
Source: secalert@redhat.com
http://www.debian.org/security/2006/dsa-936
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-950
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-961
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0160.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/16143
Source: secalert@redhat.com
Patch
http://www.trustix.org/errata/2006/0002/
Source: secalert@redhat.com
https://usn.ubuntu.com/236-1/
Source: secalert@redhat.com
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0177.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://scary.beasts.org/security/CESA-2005-003.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://secunia.com/advisories/18147
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18303
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18312
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18313
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18329
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18332
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18334
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18335
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18338
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18349
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18373
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18375
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18380
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18385
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18387
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18389
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18398
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18407
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18414
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18416
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18423
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18425
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18428
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18436
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18448
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18463
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18517
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18534
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18554
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18582
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18642
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18644
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18674
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18675
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18679
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18908
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18913
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19230
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19377
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25729
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-931
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-932
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-937
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-938
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-940
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-936
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-950
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-961
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-962
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kde.org/info/security/advisory-20051207-2.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0160.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0163.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/427053/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/427990/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/16143
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.trustix.org/errata/2006/0002/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0047
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2280
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/236-1/
Source: af854a3a-2127-422b-91ae-364da2661108

172 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.3%
89th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

xpdf