CVE-2006-0301
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Current Description
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
View Analysis Description
Analysis
Description
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0206.html
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18274
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/18677
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18707
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18825
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18826
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18834
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18837
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18838
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18839
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18860
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18862
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18864
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18875
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/18882
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18908
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18913
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/18983
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://secunia.com/advisories/19377
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://securityreason.com/securityalert/470
CVE, Inc., Red Hat
http://securitytracker.com/id?1015576
CVE, Inc., Red Hat
Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
CVE, Inc., Red Hat
Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
CVE, Inc., Red Hat
Patch
http://www.debian.org/security/2006/dsa-971
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.debian.org/security/2006/dsa-972
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.debian.org/security/2006/dsa-974
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.kde.org/info/security/advisory-20060202-1.txt
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:030
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDKSA-2006:031
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDKSA-2006:032
CVE, Inc., Red Hat
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0201.html
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.securityfocus.com/archive/1/423899/100/0/threaded
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.securityfocus.com/archive/1/427990/100/0/threaded
CVE, Inc., Red Hat
http://www.ubuntu.com/usn/usn-249-1
CVE, Inc., Red Hat
Patch
http://www.vupen.com/english/advisories/2006/0389
CVE, Inc., Red Hat
Vendor Advisory
http://www.vupen.com/english/advisories/2006/0422
CVE, Inc., Red Hat
Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=141242
CVE, Inc., Red Hat
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
CVE, Inc., Red Hat
https://exchange.xforce.ibmcloud.com/vulnerabilities/24391
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
NIST
Change History
6 change records found show changes
CVE Modified by CVE 11/20/2024 7:06:08 PM
Action
Type
Old Value
New Value
Added
Reference
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
Added
Reference
http://rhn.redhat.com/errata/RHSA-2006-0206.html
Added
Reference
http://secunia.com/advisories/18274
Added
Reference
http://secunia.com/advisories/18677
Added
Reference
http://secunia.com/advisories/18707
Added
Reference
http://secunia.com/advisories/18825
Added
Reference
http://secunia.com/advisories/18826
Added
Reference
http://secunia.com/advisories/18834
Added
Reference
http://secunia.com/advisories/18837
Added
Reference
http://secunia.com/advisories/18838
Added
Reference
http://secunia.com/advisories/18839
Added
Reference
http://secunia.com/advisories/18860
Added
Reference
http://secunia.com/advisories/18862
Added
Reference
http://secunia.com/advisories/18864
Added
Reference
http://secunia.com/advisories/18875
Added
Reference
http://secunia.com/advisories/18882
Added
Reference
http://secunia.com/advisories/18908
Added
Reference
http://secunia.com/advisories/18913
Added
Reference
http://secunia.com/advisories/18983
Added
Reference
http://secunia.com/advisories/19377
Added
Reference
http://securityreason.com/securityalert/470
Added
Reference
http://securitytracker.com/id?1015576
Added
Reference
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
Added
Reference
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
Added
Reference
http://www.debian.org/security/2006/dsa-971
Added
Reference
http://www.debian.org/security/2006/dsa-972
Added
Reference
http://www.debian.org/security/2006/dsa-974
Added
Reference
http://www.gentoo.org/security/en/glsa/glsa-200602-04.xml
Added
Reference
http://www.gentoo.org/security/en/glsa/glsa-200602-05.xml
Added
Reference
http://www.gentoo.org/security/en/glsa/glsa-200602-12.xml
Added
Reference
http://www.kde.org/info/security/advisory-20060202-1.txt
Added
Reference
http://www.mandriva.com/security/advisories?name=MDKSA-2006:030
Added
Reference
http://www.mandriva.com/security/advisories?name=MDKSA-2006:031
Added
Reference
http://www.mandriva.com/security/advisories?name=MDKSA-2006:032
Added
Reference
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.html
Added
Reference
http://www.redhat.com/support/errata/RHSA-2006-0201.html
Added
Reference
http://www.securityfocus.com/archive/1/423899/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/427990/100/0/threaded
Added
Reference
http://www.ubuntu.com/usn/usn-249-1
Added
Reference
http://www.vupen.com/english/advisories/2006/0389
Added
Reference
http://www.vupen.com/english/advisories/2006/0422
Added
Reference
https://bugzilla.novell.com/show_bug.cgi?id=141242
Added
Reference
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/24391
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850
CVE Modified by Red Hat, Inc. 5/13/2024 9:34:15 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 10/19/2018 11:44:14 AM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/427990/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/427990/100/0/threaded [Patch, Vendor Advisory]
CVE Modified by Red Hat, Inc. 10/10/2017 9:30:37 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10850 [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/19/2017 9:29:38 PM
Action
Type
Old Value
New Value
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/24391 [No Types Assigned]
Removed
Reference
http://xforce.iss.net/xforce/xfdb/24391 [Patch]
Initial CVE Analysis 1/31/2006 10:19:00 AM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2006-0301 NVD
Published Date: 01/30/2006 NVD
Last Modified: 04/02/2025
Source: Red Hat, Inc.