Vulnerability & Exploit Database

Displaying entries 1 - 10 of 80 in total

Results for: CVE-2005-3624 Back to search

USN-864-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 8
  • Published: December 02, 2009

The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."

SUSE Linux Security Advisory: SUSE-SA:2010:001 Vulnerability

  • Severity: 8
  • Published: December 02, 2009

The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."

Sun Patch: GNOME 2.6.0_x86: GNOME PDF Viewer based on Xpdf Vulnerability

  • Severity: 10
  • Published: November 26, 2007

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

Sun Patch: GNOME 2.6.0: GNOME PDF Viewer based on Xpdf Vulnerability

  • Severity: 10
  • Published: November 26, 2007

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

SUSE-SA:2006:001: xpdf,kpdf,gpdf,kword Vulnerability

  • Severity: 10
  • Published: January 11, 2006

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

RHSA-2006:0177: gpdf security update Vulnerability

  • Severity: 10
  • Published: December 31, 2005

An updated gpdf package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

gpdf is a GNOME based viewer for Portable Document Format (PDF) files. Chris Evans discovered several flaws in th...

RHSA-2006:0163: cups security update Vulnerability

  • Severity: 10
  • Published: December 31, 2005

Updated CUPS packages that fix multiple security issues are now available for Red Hat Enterprise Linux. This update has been rated as having important security impact by the Red Hat Security Response Team.

The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Chris Evans...

RHSA-2006:0160: tetex security update Vulnerability

  • Severity: 10
  • Published: December 31, 2005

Updated tetex packages that fix several integer overflows are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVic...

RHSA-2005:868: kdegraphics security update Vulnerability

  • Severity: 10
  • Published: December 31, 2005

Updated kdegraphics packages that resolve several security issues in kpdf are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

The kdegraphics packages contain applications for the K Desktop Environment including kpdf, a pdf file viewer. Several flaws we...

RHSA-2005:840: xpdf security update Vulnerability

  • Severity: 10
  • Published: December 31, 2005

An updated xpdf package that fixes several security issues is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. [Updated 20 Dec 2005] The initial fix for these issues was incomplete. The packages have been updated with a more complete fix.

The xpdf packag...