René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

174 lines
4.8 KiB
JSON

{
"id": "CVE-2005-3628",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2018-10-19T15:38:48.543",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
"lastModified": "2007-03-14T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC1CAEC5-3851-4749-AF27-E090E3C52E35"
}
]
}
]
}
],
"references": [
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
"source": "secalert@redhat.com"
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-931",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-932",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-937",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-938",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-940",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2006/dsa-936",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-950",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-961",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2006/dsa-962",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
"source": "secalert@redhat.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
"source": "secalert@redhat.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287",
"source": "secalert@redhat.com"
}
]
}