CVE-2005-3191

N/A Unknown
Published: December 07, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2005-868.html
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17897
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17908
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17912
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17916
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17920
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17921
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17926
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17929
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17940
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17976
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18009
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18055
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18061
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18189
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18191
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18192
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18313
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18336
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18349
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18385
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18387
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18416
Source: cve@mitre.org
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-840.html
Source: cve@mitre.org
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-867.html
Source: cve@mitre.org
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-878.html
Source: cve@mitre.org
Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2005-868.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17897
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17908
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17912
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17916
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17920
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17921
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17926
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17929
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17940
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17955
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/17976
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18009
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18055
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18061
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18147
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18189
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18191
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18192
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18303
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18313
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18336
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18349
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18380
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18385
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18387
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18389
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18398
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18407
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18416
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18428
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18436
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18448
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18503
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18517
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18534
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18549
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18554
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18582
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18674
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18675
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18679
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18908
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18913
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19230
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19377
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19797
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19798
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25729
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26413
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/233
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/234
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015309
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015324
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-931
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-932
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-937
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-938
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-940
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-936
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-950
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-961
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-962
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.kde.org/info/security/advisory-20051207-1.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kde.org/info/security/advisory-20051207-2.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2005_29_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_02_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-840.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-867.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-878.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0160.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/418883/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/427053/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/427990/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15726
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15727
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2005/0072/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntulinux.org/usn/usn-227-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2786
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2787
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2788
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2789
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2790
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2856
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2280
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1609
Source: af854a3a-2127-422b-91ae-364da2661108

232 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.0%
87th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

xpdf