7.5

CVE-2005-0206

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AsciiPtex Version3.1.4
CstexCstetex Version2.0.2
Easy Software ProductsCups Version1.0.4
Easy Software ProductsCups Version1.0.4_8
Easy Software ProductsCups Version1.1.1
Easy Software ProductsCups Version1.1.4
Easy Software ProductsCups Version1.1.4_2
Easy Software ProductsCups Version1.1.4_3
Easy Software ProductsCups Version1.1.4_5
Easy Software ProductsCups Version1.1.6
Easy Software ProductsCups Version1.1.7
Easy Software ProductsCups Version1.1.10
Easy Software ProductsCups Version1.1.12
Easy Software ProductsCups Version1.1.13
Easy Software ProductsCups Version1.1.14
Easy Software ProductsCups Version1.1.15
Easy Software ProductsCups Version1.1.16
Easy Software ProductsCups Version1.1.17
Easy Software ProductsCups Version1.1.18
Easy Software ProductsCups Version1.1.19
Easy Software ProductsCups Version1.1.19_rc5
Easy Software ProductsCups Version1.1.20
GnomeGpdf Version0.110
GnomeGpdf Version0.112
GnomeGpdf Version0.131
KdeKoffice Version1.3
KdeKoffice Version1.3.1
KdeKoffice Version1.3.2
KdeKoffice Version1.3.3
KdeKoffice Version1.3_beta1
KdeKoffice Version1.3_beta2
KdeKoffice Version1.3_beta3
KdeKpdf Version3.2
PdftohtmlPdftohtml Version0.32a
PdftohtmlPdftohtml Version0.32b
PdftohtmlPdftohtml Version0.33
PdftohtmlPdftohtml Version0.33a
PdftohtmlPdftohtml Version0.34
PdftohtmlPdftohtml Version0.35
PdftohtmlPdftohtml Version0.36
SgiPropack Version3.0
TetexTetex Version1.0.6
TetexTetex Version1.0.7
TetexTetex Version2.0
TetexTetex Version2.0.1
TetexTetex Version2.0.2
XpdfXpdf Version0.90
XpdfXpdf Version0.91
XpdfXpdf Version0.92
XpdfXpdf Version0.93
XpdfXpdf Version1.0
XpdfXpdf Version1.0a
XpdfXpdf Version1.1
XpdfXpdf Version2.0
XpdfXpdf Version2.1
XpdfXpdf Version2.3
XpdfXpdf Version3.0
DebianDebian Linux Version3.0
DebianDebian Linux Version3.0 Editionalpha
DebianDebian Linux Version3.0 Editionarm
DebianDebian Linux Version3.0 Editionhppa
DebianDebian Linux Version3.0 Editionia-32
DebianDebian Linux Version3.0 Editionia-64
DebianDebian Linux Version3.0 Editionm68k
DebianDebian Linux Version3.0 Editionmips
DebianDebian Linux Version3.0 Editionmipsel
DebianDebian Linux Version3.0 Editionppc
DebianDebian Linux Version3.0 Editions-390
DebianDebian Linux Version3.0 Editionsparc
KdeKde Version3.2
KdeKde Version3.2.1
KdeKde Version3.2.2
KdeKde Version3.2.3
KdeKde Version3.3
KdeKde Version3.3.1
MandrakesoftMandrake Linux Corporate Server Version3.0 Editionx86_64
RedhatEnterprise Linux Version2.1 Editionadvanced_server
RedhatEnterprise Linux Version2.1 Editionadvanced_server_ia64
RedhatEnterprise Linux Version2.1 Editionenterprise_server
RedhatEnterprise Linux Version2.1 Editionenterprise_server_ia64
RedhatEnterprise Linux Version2.1 Editionworkstation
RedhatEnterprise Linux Version2.1 Editionworkstation_ia64
RedhatEnterprise Linux Version3.0 Editionadvanced_servers
RedhatEnterprise Linux Version3.0 Editionenterprise_server
RedhatEnterprise Linux Version3.0 Editionworkstation
RedhatFedora Core Versioncore_1.0
RedhatFedora Core Versioncore_2.0
RedhatFedora Core Versioncore_3.0
RedhatLinux Version9.0 Editioni386
RedhatLinux Advanced Workstation Version2.1 Editionia64
RedhatLinux Advanced Workstation Version2.1 Editionitanium_processor
SuseSuse Linux Version1.0
SuseSuse Linux Version2.0
SuseSuse Linux Version3.0
SuseSuse Linux Version4.0
SuseSuse Linux Version4.2
SuseSuse Linux Version4.3
SuseSuse Linux Version4.4
SuseSuse Linux Version4.4.1
SuseSuse Linux Version5.0
SuseSuse Linux Version5.1
SuseSuse Linux Version5.2
SuseSuse Linux Version5.3
SuseSuse Linux Version6.0
SuseSuse Linux Version6.1
SuseSuse Linux Version6.1 Updatealpha
SuseSuse Linux Version6.2
SuseSuse Linux Version6.3
SuseSuse Linux Version6.3 Editionppc
SuseSuse Linux Version6.3 Updatealpha
SuseSuse Linux Version6.4
SuseSuse Linux Version6.4 Editioni386
SuseSuse Linux Version6.4 Editionppc
SuseSuse Linux Version6.4 Updatealpha
SuseSuse Linux Version7.0
SuseSuse Linux Version7.0 Editioni386
SuseSuse Linux Version7.0 Editionppc
SuseSuse Linux Version7.0 Editionsparc
SuseSuse Linux Version7.0 Updatealpha
SuseSuse Linux Version7.1
SuseSuse Linux Version7.1 Editionspa
SuseSuse Linux Version7.1 Editionsparc
SuseSuse Linux Version7.1 Editionx86
SuseSuse Linux Version7.1 Updatealpha
SuseSuse Linux Version7.2
SuseSuse Linux Version7.2 Editioni386
SuseSuse Linux Version7.3
SuseSuse Linux Version7.3 Editioni386
SuseSuse Linux Version7.3 Editionppc
SuseSuse Linux Version7.3 Editionsparc
SuseSuse Linux Version8.0
SuseSuse Linux Version8.0 Editioni386
SuseSuse Linux Version8.1
SuseSuse Linux Version8.2
SuseSuse Linux Version9.0
SuseSuse Linux Version9.0 Editionx86_64
SuseSuse Linux Version9.1
SuseSuse Linux Version9.1 Editionx86_64
SuseSuse Linux Version9.2
SuseSuse Linux Version9.2 Editionx86_64
UbuntuUbuntu Linux Version4.1 Editionia64
UbuntuUbuntu Linux Version4.1 Editionppc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 6.53% 0.902
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P