Lucene search

K
nvd[email protected]NVD:CVE-2004-0888
HistoryJan 27, 2005 - 5:00 a.m.

CVE-2004-0888

2005-01-2705:00:00
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

High

0.07 Low

EPSS

Percentile

94.0%

Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.

Affected configurations

NVD
Node
easy_software_productscupsMatch1.0.4
OR
easy_software_productscupsMatch1.0.4_8
OR
easy_software_productscupsMatch1.1.1
OR
easy_software_productscupsMatch1.1.4
OR
easy_software_productscupsMatch1.1.4_2
OR
easy_software_productscupsMatch1.1.4_3
OR
easy_software_productscupsMatch1.1.4_5
OR
easy_software_productscupsMatch1.1.6
OR
easy_software_productscupsMatch1.1.7
OR
easy_software_productscupsMatch1.1.10
OR
easy_software_productscupsMatch1.1.12
OR
easy_software_productscupsMatch1.1.13
OR
easy_software_productscupsMatch1.1.14
OR
easy_software_productscupsMatch1.1.15
OR
easy_software_productscupsMatch1.1.16
OR
easy_software_productscupsMatch1.1.17
OR
easy_software_productscupsMatch1.1.18
OR
easy_software_productscupsMatch1.1.19
OR
easy_software_productscupsMatch1.1.19_rc5
OR
easy_software_productscupsMatch1.1.20
OR
gnomegpdfMatch0.112
OR
gnomegpdfMatch0.131
OR
kdekofficeMatch1.3
OR
kdekofficeMatch1.3.1
OR
kdekofficeMatch1.3.2
OR
kdekofficeMatch1.3.3
OR
kdekofficeMatch1.3_beta1
OR
kdekofficeMatch1.3_beta2
OR
kdekofficeMatch1.3_beta3
OR
kdekpdfMatch3.2
OR
pdftohtmlpdftohtmlMatch0.32a
OR
pdftohtmlpdftohtmlMatch0.32b
OR
pdftohtmlpdftohtmlMatch0.33
OR
pdftohtmlpdftohtmlMatch0.33a
OR
pdftohtmlpdftohtmlMatch0.34
OR
pdftohtmlpdftohtmlMatch0.35
OR
pdftohtmlpdftohtmlMatch0.36
OR
tetextetexMatch1.0.7
OR
tetextetexMatch2.0
OR
tetextetexMatch2.0.1
OR
tetextetexMatch2.0.2
OR
xpdfxpdfMatch0.90
OR
xpdfxpdfMatch0.91
OR
xpdfxpdfMatch0.92
OR
xpdfxpdfMatch0.93
OR
xpdfxpdfMatch1.0
OR
xpdfxpdfMatch1.0a
OR
xpdfxpdfMatch1.1
OR
xpdfxpdfMatch2.0
OR
xpdfxpdfMatch2.1
OR
xpdfxpdfMatch2.3
OR
xpdfxpdfMatch3.0
Node
debiandebian_linuxMatch3.0
OR
debiandebian_linuxMatch3.0alpha
OR
debiandebian_linuxMatch3.0arm
OR
debiandebian_linuxMatch3.0hppa
OR
debiandebian_linuxMatch3.0ia-32
OR
debiandebian_linuxMatch3.0ia-64
OR
debiandebian_linuxMatch3.0m68k
OR
debiandebian_linuxMatch3.0mips
OR
debiandebian_linuxMatch3.0mipsel
OR
debiandebian_linuxMatch3.0ppc
OR
debiandebian_linuxMatch3.0s-390
OR
debiandebian_linuxMatch3.0sparc
OR
gentoolinux
OR
kdekdeMatch3.2
OR
kdekdeMatch3.2.1
OR
kdekdeMatch3.2.2
OR
kdekdeMatch3.2.3
OR
kdekdeMatch3.3
OR
kdekdeMatch3.3.1
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_server
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation_server
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatfedora_coreMatchcore_2.0
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium_processor
OR
susesuse_linuxMatch8.0
OR
susesuse_linuxMatch8.1
OR
susesuse_linuxMatch8.2
OR
susesuse_linuxMatch9.0
OR
susesuse_linuxMatch9.0x86_64
OR
susesuse_linuxMatch9.1
OR
susesuse_linuxMatch9.2
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

High

0.07 Low

EPSS

Percentile

94.0%