{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-12-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"17959","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17959"},{"name":"17929","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17929"},{"name":"19797","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19797"},{"name":"SCOSA-2006.20","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"name":"DSA-932","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-932"},{"name":"18349","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18349"},{"name":"18147","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18147"},{"name":"SCOSA-2006.15","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"name":"18055","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18055"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"name":"18679","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18679"},{"name":"18189","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18189"},{"name":"26413","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26413"},{"name":"17940","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17940"},{"name":"18303","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18303"},{"name":"DSA-931","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-931"},{"name":"18554","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18554"},{"name":"MDKSA-2006:003","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"name":"19230","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19230"},{"name":"102972","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"name":"MDKSA-2006:012","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"name":"DSA-962","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-962"},{"name":"FEDORA-2005-1171","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html"},{"name":"1015309","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015309"},{"name":"DSA-937","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-937"},{"name":"18398","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18398"},{"name":"FLSA-2006:176751","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"name":"15721","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15721"},{"name":"SUSE-SA:2006:001","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"name":"DSA-936","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-936"},{"name":"17916","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17916"},{"name":"236","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/236"},{"name":"GLSA-200603-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml"},{"name":"RHSA-2005:840","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"name":"ADV-2005-2789","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2789"},{"name":"RHSA-2005:867","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"name":"18674","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18674"},{"name":"MDKSA-2006:005","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"name":"18313","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18313"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1609"},{"name":"RHSA-2005:868","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"name":"20051201-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"name":"20060101-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"name":"18448","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18448"},{"name":"18380","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18380"},{"name":"GLSA-200512-08","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"name":"FEDORA-2005-1126","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"name":"18416","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18416"},{"name":"FEDORA-2005-1132","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html"},{"name":"ADV-2007-2280","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"name":"GLSA-200601-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"name":"19125","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19125"},{"name":"xpdf-jpx-stream-bo(23441)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23441"},{"name":"FEDORA-2005-1142","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"name":"18336","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18336"},{"name":"18061","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18061"},{"name":"18407","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18407"},{"name":"18009","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18009"},{"name":"USN-227-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"name":"17897","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17897"},{"name":"18517","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18517"},{"name":"18582","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18582"},{"name":"18534","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18534"},{"name":"SSA:2006-045-09","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"name":"TSLSA-2005-0072","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2005/0072/"},{"name":"18520","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18520"},{"name":"FEDORA-2005-1127","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"name":"20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"name":"18908","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18908"},{"name":"25729","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25729"},{"name":"MDKSA-2006:006","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"name":"17956","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17956"},{"name":"17926","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17926"},{"name":"19798","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19798"},{"name":"MDKSA-2006:008","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"name":"18191","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18191"},{"name":"20060201-01-U","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"name":"RHSA-2006:0160","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"name":"17912","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17912"},{"name":"MDKSA-2006:010","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"name":"DSA-940","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-940"},{"name":"MDKSA-2006:004","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"name":"oval:org.mitre.oval:def:11440","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440"},{"name":"ADV-2005-2790","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2790"},{"name":"20051205 Multiple Vendor xpdf JPX Stream Reader Heap Overflow Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE"],"url":"http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html"},{"name":"18389","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18389"},{"name":"18192","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18192"},{"name":"ADV-2005-2856","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2856"},{"name":"SSA:2006-045-04","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"name":"19377","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19377"},{"name":"FLSA:175404","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"name":"DSA-961","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-961"},{"name":"SCOSA-2006.21","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"name":"18675","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18675"},{"name":"1015324","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015324"},{"name":"18913","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18913"},{"name":"DSA-938","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-938"},{"name":"SUSE-SR:2005:029","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"name":"ADV-2005-2787","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2787"},{"name":"RHSA-2005:878","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"name":"FEDORA-2005-1141","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"name":"17920","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17920"},{"name":"DSA-950","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-950"},{"name":"17955","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17955"},{"name":"17976","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17976"},{"name":"18387","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18387"},{"name":"FEDORA-2005-1125","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html"},{"name":"MDKSA-2006:011","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"name":"18385","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18385"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-3193","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"17959","refsource":"SECUNIA","url":"http://secunia.com/advisories/17959"},{"name":"17929","refsource":"SECUNIA","url":"http://secunia.com/advisories/17929"},{"name":"19797","refsource":"SECUNIA","url":"http://secunia.com/advisories/19797"},{"name":"SCOSA-2006.20","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"name":"DSA-932","refsource":"DEBIAN","url":"http://www.debian.org/security/2005/dsa-932"},{"name":"18349","refsource":"SECUNIA","url":"http://secunia.com/advisories/18349"},{"name":"18147","refsource":"SECUNIA","url":"http://secunia.com/advisories/18147"},{"name":"SCOSA-2006.15","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"name":"18055","refsource":"SECUNIA","url":"http://secunia.com/advisories/18055"},{"name":"http://www.kde.org/info/security/advisory-20051207-1.txt","refsource":"CONFIRM","url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"name":"http://www.kde.org/info/security/advisory-20051207-2.txt","refsource":"CONFIRM","url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"name":"18679","refsource":"SECUNIA","url":"http://secunia.com/advisories/18679"},{"name":"18189","refsource":"SECUNIA","url":"http://secunia.com/advisories/18189"},{"name":"26413","refsource":"SECUNIA","url":"http://secunia.com/advisories/26413"},{"name":"17940","refsource":"SECUNIA","url":"http://secunia.com/advisories/17940"},{"name":"18303","refsource":"SECUNIA","url":"http://secunia.com/advisories/18303"},{"name":"DSA-931","refsource":"DEBIAN","url":"http://www.debian.org/security/2005/dsa-931"},{"name":"18554","refsource":"SECUNIA","url":"http://secunia.com/advisories/18554"},{"name":"MDKSA-2006:003","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"name":"19230","refsource":"SECUNIA","url":"http://secunia.com/advisories/19230"},{"name":"102972","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"name":"MDKSA-2006:012","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"name":"DSA-962","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-962"},{"name":"FEDORA-2005-1171","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html"},{"name":"1015309","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015309"},{"name":"DSA-937","refsource":"DEBIAN","url":"http://www.debian.org/security/2005/dsa-937"},{"name":"18398","refsource":"SECUNIA","url":"http://secunia.com/advisories/18398"},{"name":"FLSA-2006:176751","refsource":"FEDORA","url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"name":"15721","refsource":"BID","url":"http://www.securityfocus.com/bid/15721"},{"name":"SUSE-SA:2006:001","refsource":"SUSE","url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"name":"DSA-936","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-936"},{"name":"17916","refsource":"SECUNIA","url":"http://secunia.com/advisories/17916"},{"name":"236","refsource":"SREASON","url":"http://securityreason.com/securityalert/236"},{"name":"GLSA-200603-02","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml"},{"name":"RHSA-2005:840","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"name":"ADV-2005-2789","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2789"},{"name":"RHSA-2005:867","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"name":"18674","refsource":"SECUNIA","url":"http://secunia.com/advisories/18674"},{"name":"MDKSA-2006:005","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"name":"18313","refsource":"SECUNIA","url":"http://secunia.com/advisories/18313"},{"name":"https://issues.rpath.com/browse/RPL-1609","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1609"},{"name":"RHSA-2005:868","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"name":"20051201-01-U","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"name":"20060101-01-U","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"name":"18448","refsource":"SECUNIA","url":"http://secunia.com/advisories/18448"},{"name":"18380","refsource":"SECUNIA","url":"http://secunia.com/advisories/18380"},{"name":"GLSA-200512-08","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"name":"FEDORA-2005-1126","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"name":"18416","refsource":"SECUNIA","url":"http://secunia.com/advisories/18416"},{"name":"FEDORA-2005-1132","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html"},{"name":"ADV-2007-2280","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2280"},{"name":"GLSA-200601-02","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"name":"19125","refsource":"SECUNIA","url":"http://secunia.com/advisories/19125"},{"name":"xpdf-jpx-stream-bo(23441)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23441"},{"name":"FEDORA-2005-1142","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"name":"18336","refsource":"SECUNIA","url":"http://secunia.com/advisories/18336"},{"name":"18061","refsource":"SECUNIA","url":"http://secunia.com/advisories/18061"},{"name":"18407","refsource":"SECUNIA","url":"http://secunia.com/advisories/18407"},{"name":"18009","refsource":"SECUNIA","url":"http://secunia.com/advisories/18009"},{"name":"USN-227-1","refsource":"UBUNTU","url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"name":"17897","refsource":"SECUNIA","url":"http://secunia.com/advisories/17897"},{"name":"18517","refsource":"SECUNIA","url":"http://secunia.com/advisories/18517"},{"name":"18582","refsource":"SECUNIA","url":"http://secunia.com/advisories/18582"},{"name":"18534","refsource":"SECUNIA","url":"http://secunia.com/advisories/18534"},{"name":"SSA:2006-045-09","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"name":"TSLSA-2005-0072","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2005/0072/"},{"name":"18520","refsource":"SECUNIA","url":"http://secunia.com/advisories/18520"},{"name":"FEDORA-2005-1127","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"name":"20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"name":"18908","refsource":"SECUNIA","url":"http://secunia.com/advisories/18908"},{"name":"25729","refsource":"SECUNIA","url":"http://secunia.com/advisories/25729"},{"name":"MDKSA-2006:006","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"name":"17956","refsource":"SECUNIA","url":"http://secunia.com/advisories/17956"},{"name":"17926","refsource":"SECUNIA","url":"http://secunia.com/advisories/17926"},{"name":"19798","refsource":"SECUNIA","url":"http://secunia.com/advisories/19798"},{"name":"MDKSA-2006:008","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"name":"18191","refsource":"SECUNIA","url":"http://secunia.com/advisories/18191"},{"name":"20060201-01-U","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"name":"RHSA-2006:0160","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"name":"17912","refsource":"SECUNIA","url":"http://secunia.com/advisories/17912"},{"name":"MDKSA-2006:010","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"name":"DSA-940","refsource":"DEBIAN","url":"http://www.debian.org/security/2005/dsa-940"},{"name":"MDKSA-2006:004","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"name":"oval:org.mitre.oval:def:11440","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440"},{"name":"ADV-2005-2790","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2790"},{"name":"20051205 Multiple Vendor xpdf JPX Stream Reader Heap Overflow Vulnerability","refsource":"IDEFENSE","url":"http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true"},{"name":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html","refsource":"CONFIRM","url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html"},{"name":"18389","refsource":"SECUNIA","url":"http://secunia.com/advisories/18389"},{"name":"18192","refsource":"SECUNIA","url":"http://secunia.com/advisories/18192"},{"name":"ADV-2005-2856","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2856"},{"name":"SSA:2006-045-04","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"name":"19377","refsource":"SECUNIA","url":"http://secunia.com/advisories/19377"},{"name":"FLSA:175404","refsource":"FEDORA","url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"name":"DSA-961","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-961"},{"name":"SCOSA-2006.21","refsource":"SCO","url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"name":"18675","refsource":"SECUNIA","url":"http://secunia.com/advisories/18675"},{"name":"1015324","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015324"},{"name":"18913","refsource":"SECUNIA","url":"http://secunia.com/advisories/18913"},{"name":"DSA-938","refsource":"DEBIAN","url":"http://www.debian.org/security/2005/dsa-938"},{"name":"SUSE-SR:2005:029","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"name":"ADV-2005-2787","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2787"},{"name":"RHSA-2005:878","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"name":"FEDORA-2005-1141","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"name":"17920","refsource":"SECUNIA","url":"http://secunia.com/advisories/17920"},{"name":"DSA-950","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-950"},{"name":"17955","refsource":"SECUNIA","url":"http://secunia.com/advisories/17955"},{"name":"17976","refsource":"SECUNIA","url":"http://secunia.com/advisories/17976"},{"name":"18387","refsource":"SECUNIA","url":"http://secunia.com/advisories/18387"},{"name":"FEDORA-2005-1125","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html"},{"name":"MDKSA-2006:011","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"name":"18385","refsource":"SECUNIA","url":"http://secunia.com/advisories/18385"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T23:01:59.055Z"},"title":"CVE Program Container","references":[{"name":"17959","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17959"},{"name":"17929","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17929"},{"name":"19797","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19797"},{"name":"SCOSA-2006.20","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"name":"DSA-932","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-932"},{"name":"18349","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18349"},{"name":"18147","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18147"},{"name":"SCOSA-2006.15","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"name":"18055","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18055"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"name":"18679","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18679"},{"name":"18189","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18189"},{"name":"26413","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26413"},{"name":"17940","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17940"},{"name":"18303","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18303"},{"name":"DSA-931","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-931"},{"name":"18554","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18554"},{"name":"MDKSA-2006:003","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"name":"19230","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19230"},{"name":"102972","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"name":"MDKSA-2006:012","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"name":"DSA-962","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-962"},{"name":"FEDORA-2005-1171","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html"},{"name":"1015309","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015309"},{"name":"DSA-937","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-937"},{"name":"18398","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18398"},{"name":"FLSA-2006:176751","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"name":"15721","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15721"},{"name":"SUSE-SA:2006:001","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"name":"DSA-936","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-936"},{"name":"17916","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17916"},{"name":"236","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/236"},{"name":"GLSA-200603-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml"},{"name":"RHSA-2005:840","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"name":"ADV-2005-2789","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2789"},{"name":"RHSA-2005:867","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"name":"18674","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18674"},{"name":"MDKSA-2006:005","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"name":"18313","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18313"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1609"},{"name":"RHSA-2005:868","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"name":"20051201-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"name":"20060101-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"name":"18448","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18448"},{"name":"18380","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18380"},{"name":"GLSA-200512-08","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"name":"FEDORA-2005-1126","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"name":"18416","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18416"},{"name":"FEDORA-2005-1132","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html"},{"name":"ADV-2007-2280","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"name":"GLSA-200601-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"name":"19125","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19125"},{"name":"xpdf-jpx-stream-bo(23441)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23441"},{"name":"FEDORA-2005-1142","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"name":"18336","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18336"},{"name":"18061","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18061"},{"name":"18407","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18407"},{"name":"18009","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18009"},{"name":"USN-227-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"name":"17897","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17897"},{"name":"18517","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18517"},{"name":"18582","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18582"},{"name":"18534","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18534"},{"name":"SSA:2006-045-09","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"name":"TSLSA-2005-0072","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2005/0072/"},{"name":"18520","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18520"},{"name":"FEDORA-2005-1127","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"name":"20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"name":"18908","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18908"},{"name":"25729","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25729"},{"name":"MDKSA-2006:006","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"name":"17956","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17956"},{"name":"17926","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17926"},{"name":"19798","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19798"},{"name":"MDKSA-2006:008","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"name":"18191","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18191"},{"name":"20060201-01-U","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"name":"RHSA-2006:0160","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"name":"17912","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17912"},{"name":"MDKSA-2006:010","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"name":"DSA-940","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-940"},{"name":"MDKSA-2006:004","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"name":"oval:org.mitre.oval:def:11440","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440"},{"name":"ADV-2005-2790","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2790"},{"name":"20051205 Multiple Vendor xpdf JPX Stream Reader Heap Overflow Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE","x_transferred"],"url":"http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html"},{"name":"18389","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18389"},{"name":"18192","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18192"},{"name":"ADV-2005-2856","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2856"},{"name":"SSA:2006-045-04","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"name":"19377","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19377"},{"name":"FLSA:175404","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"name":"DSA-961","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-961"},{"name":"SCOSA-2006.21","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"name":"18675","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18675"},{"name":"1015324","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015324"},{"name":"18913","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18913"},{"name":"DSA-938","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-938"},{"name":"SUSE-SR:2005:029","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"name":"ADV-2005-2787","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2787"},{"name":"RHSA-2005:878","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"name":"FEDORA-2005-1141","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"name":"17920","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17920"},{"name":"DSA-950","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-950"},{"name":"17955","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17955"},{"name":"17976","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17976"},{"name":"18387","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18387"},{"name":"FEDORA-2005-1125","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html"},{"name":"MDKSA-2006:011","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"name":"18385","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18385"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-3193","datePublished":"2005-12-07T00:00:00.000Z","dateReserved":"2005-10-14T00:00:00.000Z","dateUpdated":"2024-08-07T23:01:59.055Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}