ID CVE-2005-0206
Summary The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
References
Vulnerable Configurations
  • cpe:2.3:a:ascii:ptex:3.1.4
    cpe:2.3:a:ascii:ptex:3.1.4
  • cpe:2.3:a:cstex:cstetex:2.0.2
    cpe:2.3:a:cstex:cstetex:2.0.2
  • cpe:2.3:a:easy_software_products:cups:1.0.4
    cpe:2.3:a:easy_software_products:cups:1.0.4
  • cpe:2.3:a:easy_software_products:cups:1.0.4_8
    cpe:2.3:a:easy_software_products:cups:1.0.4_8
  • cpe:2.3:a:easy_software_products:cups:1.1.1
    cpe:2.3:a:easy_software_products:cups:1.1.1
  • cpe:2.3:a:easy_software_products:cups:1.1.4
    cpe:2.3:a:easy_software_products:cups:1.1.4
  • cpe:2.3:a:easy_software_products:cups:1.1.4_2
    cpe:2.3:a:easy_software_products:cups:1.1.4_2
  • cpe:2.3:a:easy_software_products:cups:1.1.4_3
    cpe:2.3:a:easy_software_products:cups:1.1.4_3
  • cpe:2.3:a:easy_software_products:cups:1.1.4_5
    cpe:2.3:a:easy_software_products:cups:1.1.4_5
  • cpe:2.3:a:easy_software_products:cups:1.1.6
    cpe:2.3:a:easy_software_products:cups:1.1.6
  • cpe:2.3:a:easy_software_products:cups:1.1.7
    cpe:2.3:a:easy_software_products:cups:1.1.7
  • cpe:2.3:a:easy_software_products:cups:1.1.10
    cpe:2.3:a:easy_software_products:cups:1.1.10
  • cpe:2.3:a:easy_software_products:cups:1.1.12
    cpe:2.3:a:easy_software_products:cups:1.1.12
  • cpe:2.3:a:easy_software_products:cups:1.1.13
    cpe:2.3:a:easy_software_products:cups:1.1.13
  • cpe:2.3:a:easy_software_products:cups:1.1.14
    cpe:2.3:a:easy_software_products:cups:1.1.14
  • cpe:2.3:a:easy_software_products:cups:1.1.15
    cpe:2.3:a:easy_software_products:cups:1.1.15
  • cpe:2.3:a:easy_software_products:cups:1.1.16
    cpe:2.3:a:easy_software_products:cups:1.1.16
  • cpe:2.3:a:easy_software_products:cups:1.1.17
    cpe:2.3:a:easy_software_products:cups:1.1.17
  • cpe:2.3:a:easy_software_products:cups:1.1.18
    cpe:2.3:a:easy_software_products:cups:1.1.18
  • cpe:2.3:a:easy_software_products:cups:1.1.19
    cpe:2.3:a:easy_software_products:cups:1.1.19
  • cpe:2.3:a:easy_software_products:cups:1.1.19_rc5
    cpe:2.3:a:easy_software_products:cups:1.1.19_rc5
  • cpe:2.3:a:easy_software_products:cups:1.1.20
    cpe:2.3:a:easy_software_products:cups:1.1.20
  • cpe:2.3:a:gnome:gpdf:0.110
    cpe:2.3:a:gnome:gpdf:0.110
  • cpe:2.3:a:gnome:gpdf:0.112
    cpe:2.3:a:gnome:gpdf:0.112
  • cpe:2.3:a:gnome:gpdf:0.131
    cpe:2.3:a:gnome:gpdf:0.131
  • KDE KOffice 1.3
    cpe:2.3:a:kde:koffice:1.3
  • KDE KOffice 1.3.1
    cpe:2.3:a:kde:koffice:1.3.1
  • KDE KOffice 1.3.2
    cpe:2.3:a:kde:koffice:1.3.2
  • KDE KOffice 1.3.3
    cpe:2.3:a:kde:koffice:1.3.3
  • cpe:2.3:a:kde:koffice:1.3_beta1
    cpe:2.3:a:kde:koffice:1.3_beta1
  • cpe:2.3:a:kde:koffice:1.3_beta2
    cpe:2.3:a:kde:koffice:1.3_beta2
  • cpe:2.3:a:kde:koffice:1.3_beta3
    cpe:2.3:a:kde:koffice:1.3_beta3
  • cpe:2.3:a:kde:kpdf:3.2
    cpe:2.3:a:kde:kpdf:3.2
  • cpe:2.3:a:pdftohtml:pdftohtml:0.32a
    cpe:2.3:a:pdftohtml:pdftohtml:0.32a
  • cpe:2.3:a:pdftohtml:pdftohtml:0.32b
    cpe:2.3:a:pdftohtml:pdftohtml:0.32b
  • cpe:2.3:a:pdftohtml:pdftohtml:0.33
    cpe:2.3:a:pdftohtml:pdftohtml:0.33
  • cpe:2.3:a:pdftohtml:pdftohtml:0.33a
    cpe:2.3:a:pdftohtml:pdftohtml:0.33a
  • cpe:2.3:a:pdftohtml:pdftohtml:0.34
    cpe:2.3:a:pdftohtml:pdftohtml:0.34
  • cpe:2.3:a:pdftohtml:pdftohtml:0.35
    cpe:2.3:a:pdftohtml:pdftohtml:0.35
  • cpe:2.3:a:pdftohtml:pdftohtml:0.36
    cpe:2.3:a:pdftohtml:pdftohtml:0.36
  • SGI ProPack 3.0
    cpe:2.3:a:sgi:propack:3.0
  • cpe:2.3:a:tetex:tetex:1.0.6
    cpe:2.3:a:tetex:tetex:1.0.6
  • cpe:2.3:a:tetex:tetex:1.0.7
    cpe:2.3:a:tetex:tetex:1.0.7
  • cpe:2.3:a:tetex:tetex:2.0
    cpe:2.3:a:tetex:tetex:2.0
  • cpe:2.3:a:tetex:tetex:2.0.1
    cpe:2.3:a:tetex:tetex:2.0.1
  • cpe:2.3:a:tetex:tetex:2.0.2
    cpe:2.3:a:tetex:tetex:2.0.2
  • cpe:2.3:a:xpdf:xpdf:0.90
    cpe:2.3:a:xpdf:xpdf:0.90
  • cpe:2.3:a:xpdf:xpdf:0.91
    cpe:2.3:a:xpdf:xpdf:0.91
  • cpe:2.3:a:xpdf:xpdf:0.92
    cpe:2.3:a:xpdf:xpdf:0.92
  • cpe:2.3:a:xpdf:xpdf:0.93
    cpe:2.3:a:xpdf:xpdf:0.93
  • cpe:2.3:a:xpdf:xpdf:1.0
    cpe:2.3:a:xpdf:xpdf:1.0
  • cpe:2.3:a:xpdf:xpdf:1.0a
    cpe:2.3:a:xpdf:xpdf:1.0a
  • cpe:2.3:a:xpdf:xpdf:1.1
    cpe:2.3:a:xpdf:xpdf:1.1
  • cpe:2.3:a:xpdf:xpdf:2.0
    cpe:2.3:a:xpdf:xpdf:2.0
  • cpe:2.3:a:xpdf:xpdf:2.1
    cpe:2.3:a:xpdf:xpdf:2.1
  • cpe:2.3:a:xpdf:xpdf:2.3
    cpe:2.3:a:xpdf:xpdf:2.3
  • cpe:2.3:a:xpdf:xpdf:3.0
    cpe:2.3:a:xpdf:xpdf:3.0
  • cpe:2.3:o:sgi:advanced_linux_environment:3.0
    cpe:2.3:o:sgi:advanced_linux_environment:3.0
  • Debian Debian Linux 3.0
    cpe:2.3:o:debian:debian_linux:3.0
  • cpe:2.3:o:debian:debian_linux:3.0:-:alpha
    cpe:2.3:o:debian:debian_linux:3.0:-:alpha
  • cpe:2.3:o:debian:debian_linux:3.0:-:arm
    cpe:2.3:o:debian:debian_linux:3.0:-:arm
  • cpe:2.3:o:debian:debian_linux:3.0:-:hppa
    cpe:2.3:o:debian:debian_linux:3.0:-:hppa
  • cpe:2.3:o:debian:debian_linux:3.0:-:ia-32
    cpe:2.3:o:debian:debian_linux:3.0:-:ia-32
  • cpe:2.3:o:debian:debian_linux:3.0:-:ia-64
    cpe:2.3:o:debian:debian_linux:3.0:-:ia-64
  • cpe:2.3:o:debian:debian_linux:3.0:-:m68k
    cpe:2.3:o:debian:debian_linux:3.0:-:m68k
  • cpe:2.3:o:debian:debian_linux:3.0:-:mips
    cpe:2.3:o:debian:debian_linux:3.0:-:mips
  • cpe:2.3:o:debian:debian_linux:3.0:-:mipsel
    cpe:2.3:o:debian:debian_linux:3.0:-:mipsel
  • cpe:2.3:o:debian:debian_linux:3.0:-:ppc
    cpe:2.3:o:debian:debian_linux:3.0:-:ppc
  • cpe:2.3:o:debian:debian_linux:3.0:-:s-390
    cpe:2.3:o:debian:debian_linux:3.0:-:s-390
  • cpe:2.3:o:debian:debian_linux:3.0:-:sparc
    cpe:2.3:o:debian:debian_linux:3.0:-:sparc
  • Gentoo Linux
    cpe:2.3:o:gentoo:linux
  • cpe:2.3:o:kde:kde:3.2
    cpe:2.3:o:kde:kde:3.2
  • cpe:2.3:o:kde:kde:3.2.1
    cpe:2.3:o:kde:kde:3.2.1
  • cpe:2.3:o:kde:kde:3.2.2
    cpe:2.3:o:kde:kde:3.2.2
  • cpe:2.3:o:kde:kde:3.2.3
    cpe:2.3:o:kde:kde:3.2.3
  • cpe:2.3:o:kde:kde:3.3
    cpe:2.3:o:kde:kde:3.3
  • cpe:2.3:o:kde:kde:3.3.1
    cpe:2.3:o:kde:kde:3.3.1
  • MandrakeSoft Mandrake Corporate Server 3.0
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
  • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:-:x86_64
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:advanced_server
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:advanced_server
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:advanced_server_ia64
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:advanced_server_ia64
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:enterprise_server
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:enterprise_server
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:enterprise_server_ia64
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:enterprise_server_ia64
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:workstation
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:workstation
  • cpe:2.3:o:redhat:enterprise_linux:2.1:-:workstation_ia64
    cpe:2.3:o:redhat:enterprise_linux:2.1:-:workstation_ia64
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:advanced_servers
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:advanced_servers
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:enterprise_server
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:enterprise_server
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:workstation
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:workstation
  • Red Hat Desktop 3.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
  • cpe:2.3:o:redhat:fedora_core:core_1.0
    cpe:2.3:o:redhat:fedora_core:core_1.0
  • cpe:2.3:o:redhat:fedora_core:core_2.0
    cpe:2.3:o:redhat:fedora_core:core_2.0
  • cpe:2.3:o:redhat:fedora_core:core_3.0
    cpe:2.3:o:redhat:fedora_core:core_3.0
  • cpe:2.3:o:redhat:linux:9.0:-:i386
    cpe:2.3:o:redhat:linux:9.0:-:i386
  • cpe:2.3:o:redhat:linux_advanced_workstation:2.1:-:ia64
    cpe:2.3:o:redhat:linux_advanced_workstation:2.1:-:ia64
  • cpe:2.3:o:redhat:linux_advanced_workstation:2.1:-:itanium_processor
    cpe:2.3:o:redhat:linux_advanced_workstation:2.1:-:itanium_processor
  • SuSE SuSE Linux 1.0
    cpe:2.3:o:suse:suse_linux:1.0
  • cpe:2.3:o:suse:suse_linux:2.0
    cpe:2.3:o:suse:suse_linux:2.0
  • cpe:2.3:o:suse:suse_linux:3.0
    cpe:2.3:o:suse:suse_linux:3.0
  • cpe:2.3:o:suse:suse_linux:4.0
    cpe:2.3:o:suse:suse_linux:4.0
  • SuSE SuSE Linux 4.2
    cpe:2.3:o:suse:suse_linux:4.2
  • SuSE SuSE Linux 4.3
    cpe:2.3:o:suse:suse_linux:4.3
  • SuSE SuSE Linux 4.4
    cpe:2.3:o:suse:suse_linux:4.4
  • SuSE SuSE Linux 4.4.1
    cpe:2.3:o:suse:suse_linux:4.4.1
  • SuSE SuSE Linux 5.0
    cpe:2.3:o:suse:suse_linux:5.0
  • SuSE SuSE Linux 5.1
    cpe:2.3:o:suse:suse_linux:5.1
  • SuSE SuSE Linux 5.2
    cpe:2.3:o:suse:suse_linux:5.2
  • SuSE SuSE Linux 5.3
    cpe:2.3:o:suse:suse_linux:5.3
  • SuSE SuSE Linux 6.0
    cpe:2.3:o:suse:suse_linux:6.0
  • SuSE SuSE Linux 6.1
    cpe:2.3:o:suse:suse_linux:6.1
  • SuSE SuSE Linux 6.1 alpha
    cpe:2.3:o:suse:suse_linux:6.1:alpha
  • SuSE SuSE Linux 6.2
    cpe:2.3:o:suse:suse_linux:6.2
  • SuSE SuSE Linux 6.3
    cpe:2.3:o:suse:suse_linux:6.3
  • cpe:2.3:o:suse:suse_linux:6.3:-:ppc
    cpe:2.3:o:suse:suse_linux:6.3:-:ppc
  • SuSE SuSE Linux 6.3 alpha
    cpe:2.3:o:suse:suse_linux:6.3:alpha
  • SuSE SuSE Linux 6.4
    cpe:2.3:o:suse:suse_linux:6.4
  • cpe:2.3:o:suse:suse_linux:6.4:-:i386
    cpe:2.3:o:suse:suse_linux:6.4:-:i386
  • cpe:2.3:o:suse:suse_linux:6.4:-:ppc
    cpe:2.3:o:suse:suse_linux:6.4:-:ppc
  • SuSE SuSE Linux 6.4 alpha
    cpe:2.3:o:suse:suse_linux:6.4:alpha
  • SuSE SuSE Linux 7.0
    cpe:2.3:o:suse:suse_linux:7.0
  • cpe:2.3:o:suse:suse_linux:7.0:-:i386
    cpe:2.3:o:suse:suse_linux:7.0:-:i386
  • cpe:2.3:o:suse:suse_linux:7.0:-:ppc
    cpe:2.3:o:suse:suse_linux:7.0:-:ppc
  • cpe:2.3:o:suse:suse_linux:7.0:-:sparc
    cpe:2.3:o:suse:suse_linux:7.0:-:sparc
  • SuSE SuSE Linux 7.0 alpha
    cpe:2.3:o:suse:suse_linux:7.0:alpha
  • SuSE SuSE Linux 7.1
    cpe:2.3:o:suse:suse_linux:7.1
  • cpe:2.3:o:suse:suse_linux:7.1:-:spa
    cpe:2.3:o:suse:suse_linux:7.1:-:spa
  • cpe:2.3:o:suse:suse_linux:7.1:-:sparc
    cpe:2.3:o:suse:suse_linux:7.1:-:sparc
  • cpe:2.3:o:suse:suse_linux:7.1:-:x86
    cpe:2.3:o:suse:suse_linux:7.1:-:x86
  • SuSE SuSE Linux 7.1 alpha
    cpe:2.3:o:suse:suse_linux:7.1:alpha
  • SuSE SuSE Linux 7.2
    cpe:2.3:o:suse:suse_linux:7.2
  • cpe:2.3:o:suse:suse_linux:7.2:-:i386
    cpe:2.3:o:suse:suse_linux:7.2:-:i386
  • SuSE SuSE Linux 7.3
    cpe:2.3:o:suse:suse_linux:7.3
  • cpe:2.3:o:suse:suse_linux:7.3:-:i386
    cpe:2.3:o:suse:suse_linux:7.3:-:i386
  • cpe:2.3:o:suse:suse_linux:7.3:-:ppc
    cpe:2.3:o:suse:suse_linux:7.3:-:ppc
  • cpe:2.3:o:suse:suse_linux:7.3:-:sparc
    cpe:2.3:o:suse:suse_linux:7.3:-:sparc
  • SuSE SuSE Linux 8.0
    cpe:2.3:o:suse:suse_linux:8.0
  • cpe:2.3:o:suse:suse_linux:8.0:-:i386
    cpe:2.3:o:suse:suse_linux:8.0:-:i386
  • SuSE SuSE Linux 8.1
    cpe:2.3:o:suse:suse_linux:8.1
  • SuSE SuSE Linux 8.2
    cpe:2.3:o:suse:suse_linux:8.2
  • SuSE SuSE Linux 9.0
    cpe:2.3:o:suse:suse_linux:9.0
  • cpe:2.3:o:suse:suse_linux:9.0:-:x86_64
    cpe:2.3:o:suse:suse_linux:9.0:-:x86_64
  • SuSE SuSE Linux 9.1
    cpe:2.3:o:suse:suse_linux:9.1
  • cpe:2.3:o:suse:suse_linux:9.1:-:x86_64
    cpe:2.3:o:suse:suse_linux:9.1:-:x86_64
  • SuSE SuSE Linux 9.2
    cpe:2.3:o:suse:suse_linux:9.2
  • cpe:2.3:o:suse:suse_linux:9.2:-:x86_64
    cpe:2.3:o:suse:suse_linux:9.2:-:x86_64
  • cpe:2.3:o:ubuntu:ubuntu_linux:4.1:-:ia64
    cpe:2.3:o:ubuntu:ubuntu_linux:4.1:-:ia64
  • cpe:2.3:o:ubuntu:ubuntu_linux:4.1:-:ppc
    cpe:2.3:o:ubuntu:ubuntu_linux:4.1:-:ppc
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-053.NASL
    description Updated CUPS packages that fix several security issues are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System provides a portable printing layer for UNIX(R) operating systems. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf, which also affects CUPS due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause CUPS to crash or possibly execute arbitrary code when opened. This issue was assigned the name CVE-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue. A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which also affects the CUPS pdftops filter due to a shared codebase. An attacker who has the ability to send a malicious PDF file to a printer could possibly execute arbitrary code as the 'lp' user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to this issue. A buffer overflow flaw was found in the ParseCommand function in the hpgltops program. An attacker who has the ability to send a malicious HPGL file to a printer could possibly execute arbitrary code as the 'lp' user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1267 to this issue. A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf which also affects the CUPS pdftops filter due to a shared codebase. An attacker who has the ability to send a malicious PDF file to a printer could possibly execute arbitrary code as the 'lp' user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to this issue. The lppasswd utility was found to ignore write errors when modifying the CUPS passwd file. A local user who is able to fill the associated file system could corrupt the CUPS password file or prevent future uses of lppasswd. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-1268 and CVE-2004-1269 to these issues. The lppasswd utility was found to not verify that the passwd.new file is different from STDERR, which could allow local users to control output to passwd.new via certain user input that triggers an error message. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1270 to this issue. All users of cups should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17174
    published 2005-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17174
    title RHEL 4 : CUPS (RHSA-2005:053)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-057.NASL
    description An updated gpdf package that fixes two security issues is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. GPdf is a viewer for Portable Document Format (PDF) files for GNOME. A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to this issue. A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to this issue. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf, which also affects GPdf due to a shared codebase. An attacker could construct a carefully crafted PDF file that could cause GPdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CVE-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue. Users should update to this erratum package which contains backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17175
    published 2005-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17175
    title RHEL 4 : gpdf (RHSA-2005:057)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-041.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications like cups, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61922
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61922
    title Mandrake Linux Security Advisory : cups (MDKSA-2005:041)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-042.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications like gpdf, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61923
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61923
    title Mandrake Linux Security Advisory : gpdf (MDKSA-2005:042)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-034.NASL
    description An updated xpdf package that fixes several security issues is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. A buffer overflow flaw was found in the Gfx::doImage function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1125 to this issue. A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0064 to this issue. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CVE-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue. All users of Xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17168
    published 2005-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17168
    title RHEL 4 : xpdf (RHSA-2005:034)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-043.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61924
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61924
    title Mandrake Linux Security Advisory : xpdf (MDKSA-2005:043)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-213.NASL
    description An updated xpdf package that correctly fixes several integer overflows is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The xpdf package is an X Window System-based viewer for Portable Document Format (PDF) files. During a source code audit, Chris Evans and others discovered a number of integer overflow bugs that affected all versions of Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened. This issue was assigned the name CVE-2004-0888 by The Common Vulnerabilities and Exposures project (cve.mitre.org). RHSA-2004:592 contained a fix for this issue, but it was found to be incomplete and left 64-bit architectures vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue. All users of xpdf should upgrade to this updated package, which contains backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17266
    published 2005-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17266
    title RHEL 2.1 / 3 : xpdf (RHSA-2005:213)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-132.NASL
    description Updated cups packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) is a print spooler. During a source code audit, Chris Evans discovered a number of integer overflow bugs that affect Xpdf. CUPS contained a copy of the Xpdf code used for parsing PDF files and was therefore affected by these bugs. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2004-0888 to this issue, and Red Hat released erratum RHSA-2004:543 with updated packages. It was found that the patch used to correct this issue was not sufficient and did not fully protect CUPS running on 64-bit architectures. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0206 to this issue. These updated packages also include a fix that prevents the CUPS initscript from being accidentally replaced. All users of CUPS on 64-bit architectures should upgrade to these updated packages, which contain a corrected patch and are not vulnerable to these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17149
    published 2005-02-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17149
    title RHEL 3 : cups (RHSA-2005:132)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-044.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications like tetex, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61925
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61925
    title Mandrake Linux Security Advisory : tetex (MDKSA-2005:044)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-056.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications like koffice, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61926
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61926
    title Mandrake Linux Security Advisory : koffice (MDKSA-2005:056)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2008-0206.NASL
    description From Red Hat Security Advisory 2008:0206 : Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Two overflows were discovered in the HP-GL/2-to-PostScript filter. An attacker could create a malicious HP-GL/2 file that could possibly execute arbitrary code as the 'lp' user if the file is printed. (CVE-2008-0053) A buffer overflow flaw was discovered in the GIF decoding routines used by CUPS image converting filters 'imagetops' and 'imagetoraster'. An attacker could create a malicious GIF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1373) It was discovered that the patch used to address CVE-2004-0888 in CUPS packages in Red Hat Enterprise Linux 3 and 4 did not completely resolve the integer overflow in the 'pdftops' filter on 64-bit platforms. An attacker could create a malicious PDF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1374) All cups users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67674
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67674
    title Oracle Linux 3 / 4 : cups (ELSA-2008-0206)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-052.NASL
    description Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CVE-2004-0888). This also affects applications like kdegraphics, that use embedded versions of xpdf. (CVE-2005-0206) In addition, previous libtiff updates overlooked kdegraphics, which contains and embedded libtiff used for kfax. This update includes patches to address: CVE-2004-0803, CVE-2004-0804, CVE-2004-0886, CVE-2004-1183, CVE-2004-1308. The updated packages are patched to deal with these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 17281
    published 2005-03-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17281
    title Mandrake Linux Security Advisory : kdegraphics (MDKSA-2005:052)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0206.NASL
    description Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Two overflows were discovered in the HP-GL/2-to-PostScript filter. An attacker could create a malicious HP-GL/2 file that could possibly execute arbitrary code as the 'lp' user if the file is printed. (CVE-2008-0053) A buffer overflow flaw was discovered in the GIF decoding routines used by CUPS image converting filters 'imagetops' and 'imagetoraster'. An attacker could create a malicious GIF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1373) It was discovered that the patch used to address CVE-2004-0888 in CUPS packages in Red Hat Enterprise Linux 3 and 4 did not completely resolve the integer overflow in the 'pdftops' filter on 64-bit platforms. An attacker could create a malicious PDF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1374) All cups users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 31756
    published 2008-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31756
    title RHEL 3 / 4 : cups (RHSA-2008:0206)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2008-0206.NASL
    description Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. Two overflows were discovered in the HP-GL/2-to-PostScript filter. An attacker could create a malicious HP-GL/2 file that could possibly execute arbitrary code as the 'lp' user if the file is printed. (CVE-2008-0053) A buffer overflow flaw was discovered in the GIF decoding routines used by CUPS image converting filters 'imagetops' and 'imagetoraster'. An attacker could create a malicious GIF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1373) It was discovered that the patch used to address CVE-2004-0888 in CUPS packages in Red Hat Enterprise Linux 3 and 4 did not completely resolve the integer overflow in the 'pdftops' filter on 64-bit platforms. An attacker could create a malicious PDF file that could possibly execute arbitrary code as the 'lp' user if the file was printed. (CVE-2008-1374) All cups users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 31741
    published 2008-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31741
    title CentOS 3 / 4 : cups (CESA-2008:0206)
oval via4
accepted 2013-04-29T04:11:33.152-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
family unix
id oval:org.mitre.oval:def:11107
status accepted
submitted 2010-07-09T03:56:16-04:00
title The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
version 24
redhat via4
advisories
  • rhsa
    id RHSA-2005:034
  • rhsa
    id RHSA-2005:053
  • rhsa
    id RHSA-2005:057
  • rhsa
    id RHSA-2005:132
  • rhsa
    id RHSA-2005:213
refmap via4
bid 11501
mandrake
  • MDKSA-2005:041
  • MDKSA-2005:042
  • MDKSA-2005:043
  • MDKSA-2005:044
  • MDKSA-2005:052
  • MDKSA-2005:056
xf xpdf-pdf-bo(17818)
Last major update 21-08-2010 - 00:25
Published 27-04-2005 - 00:00
Last modified 10-10-2017 - 21:29
Back to Top