Unrated severityNVD Advisory· Published Jan 30, 2006· Updated Apr 16, 2026
CVE-2006-0301
CVE-2006-0301
Description
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
45- ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txtnvdPatchVendor Advisory
- rhn.redhat.com/errata/RHSA-2006-0206.htmlnvdPatchVendor Advisory
- secunia.com/advisories/18677nvdPatchVendor Advisory
- secunia.com/advisories/18707nvdPatchVendor Advisory
- secunia.com/advisories/18825nvdPatchVendor Advisory
- secunia.com/advisories/18826nvdPatchVendor Advisory
- secunia.com/advisories/18834nvdPatchVendor Advisory
- secunia.com/advisories/18837nvdPatchVendor Advisory
- secunia.com/advisories/18838nvdPatchVendor Advisory
- secunia.com/advisories/18839nvdPatchVendor Advisory
- secunia.com/advisories/18860nvdPatchVendor Advisory
- secunia.com/advisories/18862nvdPatchVendor Advisory
- secunia.com/advisories/18864nvdPatchVendor Advisory
- secunia.com/advisories/18882nvdPatchVendor Advisory
- secunia.com/advisories/18908nvdPatchVendor Advisory
- secunia.com/advisories/18913nvdPatchVendor Advisory
- secunia.com/advisories/18983nvdPatchVendor Advisory
- secunia.com/advisories/19377nvdPatchVendor Advisory
- securitytracker.com/idnvdPatch
- slackware.com/security/viewer.phpnvdPatch
- slackware.com/security/viewer.phpnvdPatch
- www.debian.org/security/2006/dsa-971nvdPatchVendor Advisory
- www.debian.org/security/2006/dsa-972nvdPatchVendor Advisory
- www.debian.org/security/2006/dsa-974nvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200602-04.xmlnvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200602-05.xmlnvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200602-12.xmlnvdPatchVendor Advisory
- www.kde.org/info/security/advisory-20060202-1.txtnvdPatchVendor Advisory
- www.redhat.com/archives/fedora-announce-list/2006-February/msg00039.htmlnvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2006-0201.htmlnvdPatchVendor Advisory
- www.securityfocus.com/archive/1/423899/100/0/threadednvdPatchVendor Advisory
- www.ubuntu.com/usn/usn-249-1nvdPatch
- secunia.com/advisories/18274nvdVendor Advisory
- secunia.com/advisories/18875nvdVendor Advisory
- www.vupen.com/english/advisories/2006/0389nvdVendor Advisory
- www.vupen.com/english/advisories/2006/0422nvdVendor Advisory
- securityreason.com/securityalert/470nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/archive/1/427990/100/0/threadednvd
- bugzilla.novell.com/show_bug.cginvd
- bugzilla.redhat.com/bugzilla/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/24391nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10850nvd
News mentions
0No linked articles in our index yet.