174 lines
4.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3628",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2018-10-19T15:38:48.543",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
"lastModified": "2007-03-14T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC1CAEC5-3851-4749-AF27-E090E3C52E35"
}
]
}
]
}
],
"references": [
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
"source": "secalert@redhat.com"
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-931",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-932",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-937",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-938",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-940",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2006/dsa-936",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-950",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-961",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2006/dsa-962",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
"source": "secalert@redhat.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287",
"source": "secalert@redhat.com"
}
]
}