{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2005-0064", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20050118 Multiple Unix/Linux Vendor Xpdf makeFileKey2 Stack Overflow", "refsource" : "IDEFENSE", "url" : "http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities" }, { "name" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch", "refsource" : "CONFIRM", "url" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch" }, { "name" : "CLA-2005:921", "refsource" : "CONECTIVA", "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921" }, { "name" : "DSA-645", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2005/dsa-645" }, { "name" : "DSA-648", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2005/dsa-648" }, { "name" : "FLSA:2352", "refsource" : "FEDORA", "url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2352" }, { "name" : "FLSA:2353", "refsource" : "FEDORA", "url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2353" }, { "name" : "GLSA-200502-10", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/200502-10" }, { "name" : "GLSA-200501-28", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/200501-28" }, { "name" : "MDKSA-2005:016", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016" }, { "name" : "MDKSA-2005:017", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017" }, { "name" : "MDKSA-2005:018", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018" }, { "name" : "MDKSA-2005:019", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019" }, { "name" : "MDKSA-2005:020", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020" }, { "name" : "MDKSA-2005:021", "refsource" : "MANDRAKE", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021" }, { "name" : "RHSA-2005:034", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-034.html" }, { "name" : "RHSA-2005:053", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-053.html" }, { "name" : "RHSA-2005:057", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-057.html" }, { "name" : "RHSA-2005:059", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-059.html" }, { "name" : "RHSA-2005:066", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-066.html" }, { "name" : "RHSA-2005:026", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2005-026.html" }, { "name" : "SCOSA-2005.42", "refsource" : "SCO", "url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt" }, { "name" : "2005-0003", "refsource" : "TRUSTIX", "url" : "http://www.trustix.org/errata/2005/0003/" }, { "name" : "20050119 [USN-64-1] xpdf, CUPS vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=110625368019554&w=2" }, { "name" : "oval:org.mitre.oval:def:11781", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781" }, { "name" : "17277", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/17277" } ] } }