Lucene search

K
nvd[email protected]NVD:CVE-2005-0206
HistoryApr 27, 2005 - 4:00 a.m.

CVE-2005-0206

2005-04-2704:00:00
web.nvd.nist.gov
5

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.07

Percentile

94.0%

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.

Affected configurations

Nvd
Node
asciiptexMatch3.1.4
OR
cstexcstetexMatch2.0.2
OR
easy_software_productscupsMatch1.0.4
OR
easy_software_productscupsMatch1.0.4_8
OR
easy_software_productscupsMatch1.1.1
OR
easy_software_productscupsMatch1.1.4
OR
easy_software_productscupsMatch1.1.4_2
OR
easy_software_productscupsMatch1.1.4_3
OR
easy_software_productscupsMatch1.1.4_5
OR
easy_software_productscupsMatch1.1.6
OR
easy_software_productscupsMatch1.1.7
OR
easy_software_productscupsMatch1.1.10
OR
easy_software_productscupsMatch1.1.12
OR
easy_software_productscupsMatch1.1.13
OR
easy_software_productscupsMatch1.1.14
OR
easy_software_productscupsMatch1.1.15
OR
easy_software_productscupsMatch1.1.16
OR
easy_software_productscupsMatch1.1.17
OR
easy_software_productscupsMatch1.1.18
OR
easy_software_productscupsMatch1.1.19
OR
easy_software_productscupsMatch1.1.19_rc5
OR
easy_software_productscupsMatch1.1.20
OR
gnomegpdfMatch0.110
OR
gnomegpdfMatch0.112
OR
gnomegpdfMatch0.131
OR
kdekofficeMatch1.3
OR
kdekofficeMatch1.3.1
OR
kdekofficeMatch1.3.2
OR
kdekofficeMatch1.3.3
OR
kdekofficeMatch1.3_beta1
OR
kdekofficeMatch1.3_beta2
OR
kdekofficeMatch1.3_beta3
OR
kdekpdfMatch3.2
OR
pdftohtmlpdftohtmlMatch0.32a
OR
pdftohtmlpdftohtmlMatch0.32b
OR
pdftohtmlpdftohtmlMatch0.33
OR
pdftohtmlpdftohtmlMatch0.33a
OR
pdftohtmlpdftohtmlMatch0.34
OR
pdftohtmlpdftohtmlMatch0.35
OR
pdftohtmlpdftohtmlMatch0.36
OR
sgipropackMatch3.0
OR
tetextetexMatch1.0.6
OR
tetextetexMatch1.0.7
OR
tetextetexMatch2.0
OR
tetextetexMatch2.0.1
OR
tetextetexMatch2.0.2
OR
xpdfxpdfMatch0.90
OR
xpdfxpdfMatch0.91
OR
xpdfxpdfMatch0.92
OR
xpdfxpdfMatch0.93
OR
xpdfxpdfMatch1.0
OR
xpdfxpdfMatch1.0a
OR
xpdfxpdfMatch1.1
OR
xpdfxpdfMatch2.0
OR
xpdfxpdfMatch2.1
OR
xpdfxpdfMatch2.3
OR
xpdfxpdfMatch3.0
OR
sgiadvanced_linux_environmentMatch3.0
Node
debiandebian_linuxMatch3.0
OR
debiandebian_linuxMatch3.0alpha
OR
debiandebian_linuxMatch3.0arm
OR
debiandebian_linuxMatch3.0hppa
OR
debiandebian_linuxMatch3.0ia-32
OR
debiandebian_linuxMatch3.0ia-64
OR
debiandebian_linuxMatch3.0m68k
OR
debiandebian_linuxMatch3.0mips
OR
debiandebian_linuxMatch3.0mipsel
OR
debiandebian_linuxMatch3.0ppc
OR
debiandebian_linuxMatch3.0s-390
OR
debiandebian_linuxMatch3.0sparc
OR
gentoolinux
OR
kdekdeMatch3.2
OR
kdekdeMatch3.2.1
OR
kdekdeMatch3.2.2
OR
kdekdeMatch3.2.3
OR
kdekdeMatch3.3
OR
kdekdeMatch3.3.1
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0x86_64
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_servers
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatfedora_coreMatchcore_1.0
OR
redhatfedora_coreMatchcore_2.0
OR
redhatfedora_coreMatchcore_3.0
OR
redhatlinuxMatch9.0i386
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium_processor
OR
susesuse_linuxMatch1.0
OR
susesuse_linuxMatch2.0
OR
susesuse_linuxMatch3.0
OR
susesuse_linuxMatch4.0
OR
susesuse_linuxMatch4.2
OR
susesuse_linuxMatch4.3
OR
susesuse_linuxMatch4.4
OR
susesuse_linuxMatch4.4.1
OR
susesuse_linuxMatch5.0
OR
susesuse_linuxMatch5.1
OR
susesuse_linuxMatch5.2
OR
susesuse_linuxMatch5.3
OR
susesuse_linuxMatch6.0
OR
susesuse_linuxMatch6.1
OR
susesuse_linuxMatch6.1alpha
OR
susesuse_linuxMatch6.2
OR
susesuse_linuxMatch6.3
OR
susesuse_linuxMatch6.3ppc
OR
susesuse_linuxMatch6.3alpha
OR
susesuse_linuxMatch6.4
OR
susesuse_linuxMatch6.4i386
OR
susesuse_linuxMatch6.4ppc
OR
susesuse_linuxMatch6.4alpha
OR
susesuse_linuxMatch7.0
OR
susesuse_linuxMatch7.0i386
OR
susesuse_linuxMatch7.0ppc
OR
susesuse_linuxMatch7.0sparc
OR
susesuse_linuxMatch7.0alpha
OR
susesuse_linuxMatch7.1
OR
susesuse_linuxMatch7.1spa
OR
susesuse_linuxMatch7.1sparc
OR
susesuse_linuxMatch7.1x86
OR
susesuse_linuxMatch7.1alpha
OR
susesuse_linuxMatch7.2
OR
susesuse_linuxMatch7.2i386
OR
susesuse_linuxMatch7.3
OR
susesuse_linuxMatch7.3i386
OR
susesuse_linuxMatch7.3ppc
OR
susesuse_linuxMatch7.3sparc
OR
susesuse_linuxMatch8.0
OR
susesuse_linuxMatch8.0i386
OR
susesuse_linuxMatch8.1
OR
susesuse_linuxMatch8.2
OR
susesuse_linuxMatch9.0
OR
susesuse_linuxMatch9.0x86_64
OR
susesuse_linuxMatch9.1
OR
susesuse_linuxMatch9.1x86_64
OR
susesuse_linuxMatch9.2
OR
susesuse_linuxMatch9.2x86_64
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc
VendorProductVersionCPE
asciiptex3.1.4cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:*
cstexcstetex2.0.2cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:*
easy_software_productscups1.0.4cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
easy_software_productscups1.0.4_8cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
easy_software_productscups1.1.1cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
easy_software_productscups1.1.4cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
easy_software_productscups1.1.4_2cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
easy_software_productscups1.1.4_3cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
easy_software_productscups1.1.4_5cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
easy_software_productscups1.1.6cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
Rows per page:
1-10 of 1461

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.07

Percentile

94.0%