CVE-2005-3627

NameCVE-2005-3627
DescriptionStream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large "Huffman table index" value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-931-1, DSA-932-1, DSA-936-1, DSA-937-1, DSA-938-1, DSA-940-1, DSA-950-1, DSA-961-1, DSA-962-1, DTSA-28-1
Debian Bugs342286, 342294, 346076

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cups (PTS)jessie, jessie (lts)1.7.5-11+deb8u12fixed
stretch (security)2.2.1-8+deb9u8fixed
stretch (lts), stretch2.2.1-8+deb9u12fixed
buster, buster (lts)2.2.10-6+deb10u11fixed
buster (security)2.2.10-6+deb10u10fixed
bullseye2.3.3op2-3+deb11u8fixed
bullseye (security)2.3.3op2-3+deb11u9fixed
bookworm2.4.2-3+deb12u7fixed
bookworm (security)2.4.2-3+deb12u8fixed
sid, trixie2.4.10-2fixed
libextractor (PTS)jessie, jessie (lts)1:1.3-2+deb8u5fixed
stretch (security), stretch (lts), stretch1:1.3-4+deb9u4fixed
buster1:1.8-2+deb10u1fixed
bullseye1:1.11-2fixed
bookworm1:1.11-7fixed
sid, trixie1:1.13-7fixed
poppler (PTS)jessie, jessie (lts)0.26.5-2+deb8u16fixed
stretch (security)0.48.0-2+deb9u4fixed
stretch (lts), stretch0.48.0-2+deb9u6fixed
buster (security), buster, buster (lts)0.71.0-5+deb10u3fixed
bullseye (security), bullseye20.09.0-3.1+deb11u1fixed
bookworm22.12.0-2fixed
sid, trixie24.08.0-3fixed
xpdf (PTS)jessie3.03-17fixed
stretch3.04-4fixed
buster3.04-13fixed
bullseye3.04+git20210103-3fixed
bookworm3.04+git20220601-1fixed
sid, trixie3.04+git20240613-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cupssource(unstable)1.1.22-7
cupsyssourcewoody1.1.14-5woody14DSA-950-1
cupsyssourcesarge(not affected)DSA-950-1
cupsyssource(unstable)1.1.22-7
gpdfsourcesarge2.8.2-1.2sarge2DSA-940-1
gpdfsourceetch2.10.0-1+etch1DTSA-28-1
gpdfsource(unstable)2.10.0-2342286
kdegraphicssourcesarge4:3.3.2-2sarge3DSA-932-1
kdegraphicssource(unstable)4:3.5.0-3
kofficesourcesarge1:1.3.5-4.sarge.2DSA-938-1
kofficesource(unstable)1:1.4.2-6342294
libextractorsourcesarge0.4.2-2sarge2DSA-936-1
libextractorsource(unstable)0.5.9-1
pdfkit.frameworksourcesarge0.8-2sarge1DSA-961-1
pdfkit.frameworksource(unstable)0.8-4
pdftohtmlsourcesarge0.36-11sarge1DSA-962-1
pdftohtmlsource(unstable)0.36-12
popplersource(unstable)0.4.4-1346076
tetex-binsourcewoody1.0.7+20011202-7.7DSA-937-1
tetex-binsourcesarge2.0.2-30sarge4DSA-937-1
tetex-binsource(unstable)3.0-12
xpdfsourcewoody1.00-3.8DSA-931-1
xpdfsourcesarge3.00-13.4DSA-931-1
xpdfsource(unstable)3.01-4

Notes

cupsys switched to an external PDF implementation in 1.1.22-7.
tetex-bin switched to poppler in 3.0-12.

Search for package or bug name: Reporting problems