Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:54
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch - Patch | |
| References | () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt - | |
| References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921 - Patch, Vendor Advisory | |
| References | () http://marc.info/?l=bugtraq&m=110625368019554&w=2 - | |
| References | () http://secunia.com/advisories/17277 - | |
| References | () http://www.debian.org/security/2005/dsa-645 - Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2005/dsa-648 - Patch, Vendor Advisory | |
| References | () http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities - Exploit, Patch, Vendor Advisory | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:016 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:017 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:018 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:019 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:020 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:021 - | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-026.html - | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-034.html - Patch, Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-053.html - Patch, Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-057.html - Patch, Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-059.html - Patch, Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-066.html - Patch, Vendor Advisory | |
| References | () http://www.trustix.org/errata/2005/0003/ - Patch, Vendor Advisory | |
| References | () https://bugzilla.fedora.us/show_bug.cgi?id=2352 - Patch, Vendor Advisory | |
| References | () https://bugzilla.fedora.us/show_bug.cgi?id=2353 - Patch, Vendor Advisory | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781 - | |
| References | () https://security.gentoo.org/glsa/200501-28 - | |
| References | () https://security.gentoo.org/glsa/200502-10 - | 
Information
                Published : 2005-05-02 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0064
Mitre link : CVE-2005-0064
CVE.ORG link : CVE-2005-0064
JSON object : View
Products Affected
                xpdf
- xpdf
CWE
                