2.1
CVSSv2

CVE-2005-2097

Published: 16/08/2005 Updated: 19/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

xpdf and kpdf do not properly validate the "loca" table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a "broken" loca table, which causes a large temporary file to be created when xpdf attempts to reconstruct the information.

Vulnerable Product Search on Vulmon Subscribe to Product

kde kpdf

xpdf xpdf 3.0_pl3

xpdf xpdf 3.0

xpdf xpdf 3.0_pl2

Vendor Advisories

xpdf and kpdf did not sufficiently verify the validity of the “loca” table in PDF files, a table that contains glyph description information for embedded TrueType fonts After detecting the broken table, xpdf attempted to reconstruct the information in it, which caused the generation of a huge temporary file that quickly filled up available dis ...
Synopsis cups security update Type/Severity Security Advisory: Important Topic Updated CUPS packages that fix a security issue are now available for RedHat Enterprise LinuxThis update has been rated as having important security impact by the Red HatSecurity Response Team Description The C ...
Synopsis kdegraphics security update Type/Severity Security Advisory: Moderate Topic Updated kdegraphics packages that resolve a security issue in kpdf are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The kdegra ...
Synopsis xpdf security update Type/Severity Security Advisory: Moderate Topic An updated xpdf package that fixes a security issue is now available forRed Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team Description Th ...
Synopsis gpdf security update Type/Severity Security Advisory: Moderate Topic An updated gpdf package that fixes a security issue is now available forRed Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team Description Th ...
A bug has been discovered in the font handling code in xpdf, which is also present in kpdf, the PDF viewer for KDE A specially crafted PDF file could cause infinite resource consumption, in terms of both CPU and disk space The oldstable distribution (woody) is not affected by this problem For the stable distribution (sarge) this problem has been ...
infamous41md and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which are also present in gpdf, the viewer with Gtk bindings, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code For the stable distribution (sarge) these p ...