{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2006-1244", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc. NOTE: this description is based on Debian advisory DSA 979, which is based on changes that were made after other vulnerabilities such as CVE-2006-0301 and CVE-2005-3624 through CVE-2005-3628 were fixed. Some of these newer fixes appear to be security-relevant, although it is not clear if they fix specific issues or are defensive in nature." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "DSA-979", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-979" }, { "name" : "http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3.diff.gz", "refsource" : "MISC", "url" : "http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge3.diff.gz" }, { "name" : "DSA-982", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-982" }, { "name" : "DSA-983", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-983" }, { "name" : "DSA-984", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-984" }, { "name" : "DSA-1019", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-1019" }, { "name" : "DSA-998", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-998" }, { "name" : "USN-270-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/270-1/" }, { "name" : "16748", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/16748" }, { "name" : "23834", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/23834" }, { "name" : "19364", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19364" }, { "name" : "19644", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19644" }, { "name" : "18948", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/18948" }, { "name" : "19021", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19021" }, { "name" : "19091", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19091" }, { "name" : "19065", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19065" }, { "name" : "19164", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/19164" } ] } }