{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2005-3191","title":"Title"},{"category":"description","text":"Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2005-3191","url":"https://www.suse.com/security/cve/CVE-2005-3191"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 137156 for CVE-2005-3191","url":"https://bugzilla.suse.com/137156"},{"category":"external","summary":"SUSE Bug 142106 for CVE-2005-3191","url":"https://bugzilla.suse.com/142106"},{"category":"external","summary":"Advisory link for SUSE-SA:2006:001","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRY6RHDPEAHDBBB73AHO74DPVUFBVTJP/#BRY6RHDPEAHDBBB73AHO74DPVUFBVTJP"},{"category":"external","summary":"Advisory link for SUSE-SR:2005:029","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G5ZO4T5OVGGP7R2ULQVUQ3WYM3QLY5VE/#G5ZO4T5OVGGP7R2ULQVUQ3WYM3QLY5VE"},{"category":"external","summary":"Advisory link for SUSE-SR:2005:030","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVFLUVZS5BGFNCN2FFA2CBJI2ULRFZH6/#WVFLUVZS5BGFNCN2FFA2CBJI2ULRFZH6"},{"category":"external","summary":"Advisory link for SUSE-SR:2006:001","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIYSAPQ6TQHXMGLZSNERXHHCQZWXBUYN/#YIYSAPQ6TQHXMGLZSNERXHHCQZWXBUYN"},{"category":"external","summary":"Advisory link for SUSE-SR:2006:002","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPCCSYGV7S3XUI5X2IOXQCF4LC26BLXY/#PPCCSYGV7S3XUI5X2IOXQCF4LC26BLXY"}],"title":"SUSE CVE CVE-2005-3191","tracking":{"current_release_date":"2023-12-09T03:43:19Z","generator":{"date":"2023-02-15T06:17:19Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2005-3191","initial_release_date":"2023-02-15T06:17:19Z","revision_history":[{"date":"2023-02-15T06:17:19Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:21:39Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:43:19Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}