Action not permitted
Modal body text goes here.
cve-2004-0886
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.875Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2004:577", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "name": "MDKSA-2004:109", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "name": "RHSA-2005:021", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "name": "P-015", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "name": "201072", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "name": "oval:org.mitre.oval:def:9907", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "name": "101677", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "name": "SUSE-SA:2004:038", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "name": "VU#687568", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/687568" }, { "name": "1011674", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011674" }, { "name": "CLA-2004:888", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "name": "MDKSA-2005:052", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "name": "libtiff-bo(17715)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "name": "RHSA-2005:354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "name": "12818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12818" }, { "name": "11406", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11406" }, { "name": "oval:org.mitre.oval:def:100116", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" }, { "name": "DSA-567", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-567" }, { "name": "OpenPKG-SA-2004.043", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2004:577", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "name": "MDKSA-2004:109", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "name": "RHSA-2005:021", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "name": "P-015", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "name": "201072", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "name": "oval:org.mitre.oval:def:9907", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "name": "101677", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "name": "SUSE-SA:2004:038", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "name": "VU#687568", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/687568" }, { "name": "1011674", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011674" }, { "name": "CLA-2004:888", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "name": "MDKSA-2005:052", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "name": "libtiff-bo(17715)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "name": "RHSA-2005:354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "name": "12818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12818" }, { "name": "11406", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11406" }, { "name": "oval:org.mitre.oval:def:100116", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" }, { "name": "DSA-567", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-567" }, { "name": "OpenPKG-SA-2004.043", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0886", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:577", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "name": "MDKSA-2004:109", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "name": "RHSA-2005:021", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "name": "P-015", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "name": "201072", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "name": "oval:org.mitre.oval:def:9907", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "name": "101677", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "name": "SUSE-SA:2004:038", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "name": "VU#687568", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/687568" }, { "name": "1011674", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011674" }, { "name": "CLA-2004:888", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "name": "MDKSA-2005:052", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "name": "libtiff-bo(17715)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://www.kde.org/info/security/advisory-20041209-2.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "name": "RHSA-2005:354", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "name": "12818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12818" }, { "name": "11406", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11406" }, { "name": "oval:org.mitre.oval:def:100116", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" }, { "name": "DSA-567", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-567" }, { "name": "OpenPKG-SA-2004.043", "refsource": "OPENPKG", "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0886", "datePublished": "2004-10-26T04:00:00", "dateReserved": "2004-09-22T00:00:00", "dateUpdated": "2024-08-08T00:31:47.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0886\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-01-27T05:00:00.000\",\"lastModified\":\"2024-11-20T23:49:36.597\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCA5EEB8-9D2C-49A9-BB08-CE5017B79D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261FAE51-5207-4136-9FFE-2330A281266C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32C83B9-F7DA-450A-A687-9A73734CD712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9485283A-B73E-4567-914A-42A86F5FFCB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95892168-0FB6-4E3F-9303-2F9B3CF60D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5021564-5E0A-4DDC-BC68-200B6050043E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AA66E5-FDDD-4243-B945-DFEBDD25F258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F359CD-5DC4-4919-B8E1-95BDDBD27EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2C8C550-3313-4266-B4B3-E9E9047CFE04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A70D7A-D552-49A4-9E6F-B014BF195D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wxgtk2:wxgtk2:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6613FA38-E5C4-4BE8-8994-C00AB68A266B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2814035-2888-43B9-B597-2CBF17C56FD5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E3EED7-FE30-4620-B40B-9CC49B77408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A24978-2891-425C-ACF6-E8F5C839C54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B20E130-6078-4336-B614-273C27142B46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB461678-560D-436E-A3AE-9E1E16DB0412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFDADE04-29F0-446B-824B-0518880CF0A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9BE602-A740-4CF7-9CAF-59061B16AB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E698C1-C313-40E6-BAF9-7C8F9CF02484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2D00AC-FA2A-4C39-B796-DC19072862CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421079DA-B605-4E05-9454-C30CF7631CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B734BA-3435-40A9-B22B-5D56CEB865A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AE033B-5F16-4262-A397-02D7450189B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E831F3E-A980-47AF-BD05-2DB1A14689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36991737-904F-4B26-AEE2-7B30411279E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EE6036-1A18-43F1-8A92-7DF39E1516E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"620ECFC8-293D-4C2B-9698-67185BB6E2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F14A45-BDDB-4C12-9370-D5241975A928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46BC34D4-A1E8-4E01-982D-EAF03A0EB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35932546-B614-47C0-98E6-8EF1EFE06725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F17066-C090-4DD7-A1AC-D8FF70D268CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E997653-C744-4F1F-9948-47579AB3BED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF5A416A-F198-4B9C-8221-D36CC8A7FE5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"384C130F-D1A9-4482-AF20-FC81933473A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA6BD2A-3022-408D-8E4F-50865996E965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"463D5628-7536-4029-99D6-5E525050059E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A39B11-1C23-4A6C-B4C5-AEC40836F173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F69843-978D-4686-BC5B-1D09DA4A21BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEE0AED-7918-41E9-A902-AC4070E03132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E19472-47B4-4398-A188-CA5A5D3E7060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17407A2-089E-43A5-9BD5-EFF966F5CC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4B436D-8D6A-473E-B707-26147208808B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E26B353-4985-4116-B97A-5767CDC732F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"2641EE56-6F9D-400B-B456-877F4DA79B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E0B458EA-495E-40FA-9379-C03757F7B1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"409E324A-C040-494F-A026-9DCAE01C07F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"1728AB5D-55A9-46B0-A412-6F7263CAEB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6474B775-C893-491F-A074-802AFB1FEDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE2E73-9536-41A9-B83B-0A06B54857F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6996B14-925B-46B8-982F-3545328B506B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"84A50ED3-FD0D-4038-B3E7-CC65D166C968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*\",\"matchCriteriaId\":\"777F9EC0-2919-45CA-BFF8-78A02537C513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*\",\"matchCriteriaId\":\"C7EAAD04-D7C4-43DE-B488-1AAD014B503E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF3C-1379-4CBE-8FF5-DACD47834651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C55338-3372-413F-82E3-E1B476D6F41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7446746-87B7-4BD3-AABF-1E0FAA8265AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABFCE5-4F86-4AE8-9849-BC360AC72098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39605B96-BAD6-45C9-BB9A-43D6E2C51ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67735E5-E43E-4164-BDB2-ADC6E0288E9F\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/12818\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1011674\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ciac.org/ciac/bulletins/p-015.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-567\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/687568\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kde.org/info/security/advisory-20041209-2.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:109\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:052\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_38_libtiff.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-577.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-354.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/11406\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2004/0054/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/17715\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/12818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1011674\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ciac.org/ciac/bulletins/p-015.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2004/dsa-567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/687568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kde.org/info/security/advisory-20041209-2.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:109\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_38_libtiff.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-577.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/11406\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2004/0054/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/17715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-j6h2-3q8p-c4j8
Vulnerability from github
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
{ "affected": [], "aliases": [ "CVE-2004-0886" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-01-27T05:00:00Z", "severity": "MODERATE" }, "details": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "id": "GHSA-j6h2-3q8p-c4j8", "modified": "2022-04-29T02:58:32Z", "published": "2022-04-29T02:58:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/12818" }, { "type": "WEB", "url": "http://securitytracker.com/id?1011674" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-567" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/687568" }, { "type": "WEB", "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/11406" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2004/0054" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2005_021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kdegraphics packages that resolve multiple security issues in kfax\nare now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team", "title": "Topic" }, { "category": "general", "text": "The kdegraphics package contains graphics applications for the K Desktop\nEnvironment.\n\nDuring a source code audit, Chris Evans discovered a number of integer\noverflow bugs that affect libtiff. The kfax application contains a copy of\nthe libtiff code used for parsing TIFF files and is therefore affected by\nthese bugs. An attacker who has the ability to trick a user into opening a\nmalicious TIFF file could cause kfax to crash or possibly execute arbitrary\ncode. The Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the names CAN-2004-0886 and CAN-2004-0804 to these issues.\n\nAdditionally, a number of buffer overflow bugs that affect libtiff have\nbeen found. The kfax application contains a copy of the libtiff code used\nfor parsing TIFF files and is therefore affected by these bugs. An attacker\nwho has the ability to trick a user into opening a malicious TIFF file\ncould cause kfax to crash or possibly execute arbitrary code. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0803 to this issue.\n\nUsers of kfax should upgrade to these updated packages, which contain\nbackported patches and are not vulnerable to this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:021", "url": "https://access.redhat.com/errata/RHSA-2005:021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "135466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135466" }, { "category": "external", "summary": "135470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135470" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_021.json" } ], "title": "Red Hat Security Advisory: kdegraphics security update", "tracking": { "current_release_date": "2024-11-21T23:22:25+00:00", "generator": { "date": "2024-11-21T23:22:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:021", "initial_release_date": "2005-04-12T14:07:00+00:00", "revision_history": [ { "date": "2005-04-12T14:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-04-14T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:22:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.ia64", "product": { "name": "kdegraphics-7:3.1.3-3.7.ia64", "product_id": "kdegraphics-7:3.1.3-3.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.ia64", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.ia64", "product_id": "kdegraphics-devel-7:3.1.3-3.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=ia64\u0026epoch=7" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.src", "product": { "name": "kdegraphics-7:3.1.3-3.7.src", "product_id": "kdegraphics-7:3.1.3-3.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=src\u0026epoch=7" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.x86_64", "product": { "name": "kdegraphics-7:3.1.3-3.7.x86_64", "product_id": "kdegraphics-7:3.1.3-3.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "product_id": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=x86_64\u0026epoch=7" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.i386", "product": { "name": "kdegraphics-7:3.1.3-3.7.i386", "product_id": "kdegraphics-7:3.1.3-3.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.i386", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.i386", "product_id": "kdegraphics-devel-7:3.1.3-3.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=i386\u0026epoch=7" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.ppc", "product": { "name": "kdegraphics-7:3.1.3-3.7.ppc", "product_id": "kdegraphics-7:3.1.3-3.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.ppc", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.ppc", "product_id": "kdegraphics-devel-7:3.1.3-3.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=ppc\u0026epoch=7" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.s390x", "product": { "name": "kdegraphics-7:3.1.3-3.7.s390x", "product_id": "kdegraphics-7:3.1.3-3.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.s390x", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390x", "product_id": "kdegraphics-devel-7:3.1.3-3.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=s390x\u0026epoch=7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.1.3-3.7.s390", "product": { "name": "kdegraphics-7:3.1.3-3.7.s390", "product_id": "kdegraphics-7:3.1.3-3.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.1.3-3.7?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.1.3-3.7.s390", "product": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390", "product_id": "kdegraphics-devel-7:3.1.3-3.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.1.3-3.7?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "product": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "product_id": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.1.3-3.7?arch=s390\u0026epoch=7" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-7:3.1.3-3.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.src" }, "product_reference": "kdegraphics-7:3.1.3-3.7.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-7:3.1.3-3.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.src" }, "product_reference": "kdegraphics-7:3.1.3-3.7.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-7:3.1.3-3.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.src" }, "product_reference": "kdegraphics-7:3.1.3-3.7.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-7:3.1.3-3.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.src" }, "product_reference": "kdegraphics-7:3.1.3-3.7.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.i386" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.s390" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.1.3-3.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" }, "product_reference": "kdegraphics-devel-7:3.1.3-3.7.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0803", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617294" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0803" }, { "category": "external", "summary": "RHBZ#1617294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617294" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0803", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-12T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:021" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0804", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617295" } ], "notes": [ { "category": "description", "text": "Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0804" }, { "category": "external", "summary": "RHBZ#1617295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0804", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804" } ], "release_date": "2002-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-12T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:021" } ], "title": "security flaw" }, { "cve": "CVE-2004-0886", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617314" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0886" }, { "category": "external", "summary": "RHBZ#1617314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617314" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0886", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-12T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:021" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1307", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617405" } ], "notes": [ { "category": "description", "text": "Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was resolved in all affected libtiff versions as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 via a patch for CVE-2004-0886. For updates containing patches for CVE-2004-0886, see: https://rhn.redhat.com/errata/CVE-2004-0886.html", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1307" }, { "category": "external", "summary": "RHBZ#1617405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1307", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1307" } ], "release_date": "2004-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-12T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:021" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1308", "discovery_date": "2004-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617406" } ], "notes": [ { "category": "description", "text": "Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1308" }, { "category": "external", "summary": "RHBZ#1617406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1308", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1308" } ], "release_date": "2004-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-12T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kdegraphics-7:3.1.3-3.7.i386", "3AS:kdegraphics-7:3.1.3-3.7.ia64", "3AS:kdegraphics-7:3.1.3-3.7.ppc", "3AS:kdegraphics-7:3.1.3-3.7.s390", "3AS:kdegraphics-7:3.1.3-3.7.s390x", "3AS:kdegraphics-7:3.1.3-3.7.src", "3AS:kdegraphics-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3AS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3AS:kdegraphics-devel-7:3.1.3-3.7.i386", "3AS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3AS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390", "3AS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3AS:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-7:3.1.3-3.7.src", "3Desktop:kdegraphics-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.i386", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ia64", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.ppc", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.s390x", "3Desktop:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-7:3.1.3-3.7.i386", "3ES:kdegraphics-7:3.1.3-3.7.ia64", "3ES:kdegraphics-7:3.1.3-3.7.ppc", "3ES:kdegraphics-7:3.1.3-3.7.s390", "3ES:kdegraphics-7:3.1.3-3.7.s390x", "3ES:kdegraphics-7:3.1.3-3.7.src", "3ES:kdegraphics-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3ES:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3ES:kdegraphics-devel-7:3.1.3-3.7.i386", "3ES:kdegraphics-devel-7:3.1.3-3.7.ia64", "3ES:kdegraphics-devel-7:3.1.3-3.7.ppc", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390", "3ES:kdegraphics-devel-7:3.1.3-3.7.s390x", "3ES:kdegraphics-devel-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-7:3.1.3-3.7.i386", "3WS:kdegraphics-7:3.1.3-3.7.ia64", "3WS:kdegraphics-7:3.1.3-3.7.ppc", "3WS:kdegraphics-7:3.1.3-3.7.s390", "3WS:kdegraphics-7:3.1.3-3.7.s390x", "3WS:kdegraphics-7:3.1.3-3.7.src", "3WS:kdegraphics-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.i386", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ia64", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.ppc", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.s390x", "3WS:kdegraphics-debuginfo-7:3.1.3-3.7.x86_64", "3WS:kdegraphics-devel-7:3.1.3-3.7.i386", "3WS:kdegraphics-devel-7:3.1.3-3.7.ia64", "3WS:kdegraphics-devel-7:3.1.3-3.7.ppc", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390", "3WS:kdegraphics-devel-7:3.1.3-3.7.s390x", "3WS:kdegraphics-devel-7:3.1.3-3.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:021" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_354
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tetex packages that fix several integer overflows are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "TeTeX is an implementation of TeX for Linux or UNIX systems. TeX takes\na text file and a set of formatting commands as input and creates a\ntypesetter-independent .dvi (DeVice Independent) file as output.\n\nA number of security flaws have been found affecting libraries used\ninternally within teTeX. An attacker who has the ability to trick a user\ninto processing a malicious file with teTeX could cause teTeX to crash or\npossibly execute arbitrary code. \n\nA number of integer overflow bugs that affect Xpdf were discovered. The\nteTeX package contains a copy of the Xpdf code used for parsing PDF files\nand is therefore affected by these bugs. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names CAN-2004-0888 and\nCAN-2004-1125 to these issues.\n\nA number of integer overflow bugs that affect libtiff were discovered. The\nteTeX package contains an internal copy of libtiff used for parsing TIFF\nimage files and is therefore affected by these bugs. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nnames CAN-2004-0803, CAN-2004-0804 and CAN-2004-0886 to these issues.\n\nAlso latex2html is added to package tetex-latex for 64bit platforms.\n\nUsers of teTeX should upgrade to these updated packages, which contain\nbackported patches and are not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:354", "url": "https://access.redhat.com/errata/RHSA-2005:354" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "137475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137475" }, { "category": "external", "summary": "137607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137607" }, { "category": "external", "summary": "137973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137973" }, { "category": "external", "summary": "145129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145129" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_354.json" } ], "title": "Red Hat Security Advisory: tetex security update", "tracking": { "current_release_date": "2024-11-21T23:23:23+00:00", "generator": { "date": "2024-11-21T23:23:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:354", "initial_release_date": "2005-04-01T14:39:00+00:00", "revision_history": [ { "date": "2005-04-01T14:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-04-01T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:23:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.ia64", "product": { "name": "tetex-afm-0:1.0.7-67.7.ia64", "product_id": "tetex-afm-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.ia64", "product": { "name": "tetex-dvips-0:1.0.7-67.7.ia64", "product_id": "tetex-dvips-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.ia64", "product": { "name": "tetex-latex-0:1.0.7-67.7.ia64", "product_id": "tetex-latex-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.ia64", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.ia64", "product_id": "tetex-xdvi-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.ia64", "product": { "name": "tetex-0:1.0.7-67.7.ia64", "product_id": "tetex-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.ia64", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.ia64", "product_id": "tetex-debuginfo-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=ia64" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.ia64", "product": { "name": "tetex-fonts-0:1.0.7-67.7.ia64", "product_id": "tetex-fonts-0:1.0.7-67.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-afm-0:1.0.7-67.7.x86_64", "product_id": "tetex-afm-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-dvips-0:1.0.7-67.7.x86_64", "product_id": "tetex-dvips-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-latex-0:1.0.7-67.7.x86_64", "product_id": "tetex-latex-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.x86_64", "product_id": "tetex-xdvi-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-0:1.0.7-67.7.x86_64", "product_id": "tetex-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "product_id": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.x86_64", "product": { "name": "tetex-fonts-0:1.0.7-67.7.x86_64", "product_id": "tetex-fonts-0:1.0.7-67.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.i386", "product": { "name": "tetex-afm-0:1.0.7-67.7.i386", "product_id": "tetex-afm-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.i386", "product": { "name": "tetex-dvips-0:1.0.7-67.7.i386", "product_id": "tetex-dvips-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.i386", "product": { "name": "tetex-latex-0:1.0.7-67.7.i386", "product_id": "tetex-latex-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.i386", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.i386", "product_id": "tetex-xdvi-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.i386", "product": { "name": "tetex-0:1.0.7-67.7.i386", "product_id": "tetex-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.i386", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.i386", "product_id": "tetex-debuginfo-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=i386" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.i386", "product": { "name": "tetex-fonts-0:1.0.7-67.7.i386", "product_id": "tetex-fonts-0:1.0.7-67.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "tetex-0:1.0.7-67.7.src", "product": { "name": "tetex-0:1.0.7-67.7.src", "product_id": "tetex-0:1.0.7-67.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.ppc", "product": { "name": "tetex-afm-0:1.0.7-67.7.ppc", "product_id": "tetex-afm-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.ppc", "product": { "name": "tetex-dvips-0:1.0.7-67.7.ppc", "product_id": "tetex-dvips-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.ppc", "product": { "name": "tetex-latex-0:1.0.7-67.7.ppc", "product_id": "tetex-latex-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.ppc", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.ppc", "product_id": "tetex-xdvi-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.ppc", "product": { "name": "tetex-0:1.0.7-67.7.ppc", "product_id": "tetex-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.ppc", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.ppc", "product_id": "tetex-debuginfo-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=ppc" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.ppc", "product": { "name": "tetex-fonts-0:1.0.7-67.7.ppc", "product_id": "tetex-fonts-0:1.0.7-67.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.s390x", "product": { "name": "tetex-afm-0:1.0.7-67.7.s390x", "product_id": "tetex-afm-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.s390x", "product": { "name": "tetex-dvips-0:1.0.7-67.7.s390x", "product_id": "tetex-dvips-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.s390x", "product": { "name": "tetex-latex-0:1.0.7-67.7.s390x", "product_id": "tetex-latex-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.s390x", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.s390x", "product_id": "tetex-xdvi-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.s390x", "product": { "name": "tetex-0:1.0.7-67.7.s390x", "product_id": "tetex-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.s390x", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390x", "product_id": "tetex-debuginfo-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=s390x" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.s390x", "product": { "name": "tetex-fonts-0:1.0.7-67.7.s390x", "product_id": "tetex-fonts-0:1.0.7-67.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tetex-afm-0:1.0.7-67.7.s390", "product": { "name": "tetex-afm-0:1.0.7-67.7.s390", "product_id": "tetex-afm-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-dvips-0:1.0.7-67.7.s390", "product": { "name": "tetex-dvips-0:1.0.7-67.7.s390", "product_id": "tetex-dvips-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-latex-0:1.0.7-67.7.s390", "product": { "name": "tetex-latex-0:1.0.7-67.7.s390", "product_id": "tetex-latex-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-xdvi-0:1.0.7-67.7.s390", "product": { "name": "tetex-xdvi-0:1.0.7-67.7.s390", "product_id": "tetex-xdvi-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-0:1.0.7-67.7.s390", "product": { "name": "tetex-0:1.0.7-67.7.s390", "product_id": "tetex-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:1.0.7-67.7.s390", "product": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390", "product_id": "tetex-debuginfo-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.7?arch=s390" } } }, { "category": "product_version", "name": "tetex-fonts-0:1.0.7-67.7.s390", "product": { "name": "tetex-fonts-0:1.0.7-67.7.s390", "product_id": "tetex-fonts-0:1.0.7-67.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.7?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.src" }, "product_reference": "tetex-0:1.0.7-67.7.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.i386" }, "product_reference": "tetex-afm-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.s390" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-afm-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.i386" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.s390" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.i386" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.s390" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-dvips-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.i386" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.s390" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-fonts-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-latex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-latex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.i386" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.s390" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.src" }, "product_reference": "tetex-0:1.0.7-67.7.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.i386" }, "product_reference": "tetex-afm-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.s390" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.i386" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.s390" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.i386" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.s390" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-latex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.src" }, "product_reference": "tetex-0:1.0.7-67.7.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.i386" }, "product_reference": "tetex-afm-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.s390" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-afm-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.i386" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.s390" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.i386" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.s390" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-dvips-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.i386" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.s390" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-fonts-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-latex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-latex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.i386" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.s390" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.src" }, "product_reference": "tetex-0:1.0.7-67.7.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.i386" }, "product_reference": "tetex-afm-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-afm-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.s390" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-afm-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-afm-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-afm-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.i386" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.s390" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-debuginfo-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.i386" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.s390" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-dvips-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-dvips-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.i386" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.s390" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-fonts-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-fonts-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.i386" }, "product_reference": "tetex-latex-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-latex-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.s390" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-latex-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-latex-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-latex-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.i386" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.ia64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.ppc" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.s390" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.s390x" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:1.0.7-67.7.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" }, "product_reference": "tetex-xdvi-0:1.0.7-67.7.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0803", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617294" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0803" }, { "category": "external", "summary": "RHBZ#1617294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617294" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0803", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-01T14:39:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:354" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0804", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617295" } ], "notes": [ { "category": "description", "text": "Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0804" }, { "category": "external", "summary": "RHBZ#1617295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0804", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804" } ], "release_date": "2002-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-01T14:39:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:354" } ], "title": "security flaw" }, { "cve": "CVE-2004-0886", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617314" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0886" }, { "category": "external", "summary": "RHBZ#1617314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617314" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0886", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-01T14:39:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:354" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0888", "discovery_date": "2004-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617315" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0888" }, { "category": "external", "summary": "RHBZ#1617315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0888", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0888" } ], "release_date": "2004-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-01T14:39:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:354" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1125", "discovery_date": "2004-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617371" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1125" }, { "category": "external", "summary": "RHBZ#1617371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1125", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1125" } ], "release_date": "2004-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-01T14:39:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:tetex-0:1.0.7-67.7.i386", "3AS:tetex-0:1.0.7-67.7.ia64", "3AS:tetex-0:1.0.7-67.7.ppc", "3AS:tetex-0:1.0.7-67.7.s390", "3AS:tetex-0:1.0.7-67.7.s390x", "3AS:tetex-0:1.0.7-67.7.src", "3AS:tetex-0:1.0.7-67.7.x86_64", "3AS:tetex-afm-0:1.0.7-67.7.i386", "3AS:tetex-afm-0:1.0.7-67.7.ia64", "3AS:tetex-afm-0:1.0.7-67.7.ppc", "3AS:tetex-afm-0:1.0.7-67.7.s390", "3AS:tetex-afm-0:1.0.7-67.7.s390x", "3AS:tetex-afm-0:1.0.7-67.7.x86_64", "3AS:tetex-debuginfo-0:1.0.7-67.7.i386", "3AS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3AS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390", "3AS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3AS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3AS:tetex-dvips-0:1.0.7-67.7.i386", "3AS:tetex-dvips-0:1.0.7-67.7.ia64", "3AS:tetex-dvips-0:1.0.7-67.7.ppc", "3AS:tetex-dvips-0:1.0.7-67.7.s390", "3AS:tetex-dvips-0:1.0.7-67.7.s390x", "3AS:tetex-dvips-0:1.0.7-67.7.x86_64", "3AS:tetex-fonts-0:1.0.7-67.7.i386", "3AS:tetex-fonts-0:1.0.7-67.7.ia64", "3AS:tetex-fonts-0:1.0.7-67.7.ppc", "3AS:tetex-fonts-0:1.0.7-67.7.s390", "3AS:tetex-fonts-0:1.0.7-67.7.s390x", "3AS:tetex-fonts-0:1.0.7-67.7.x86_64", "3AS:tetex-latex-0:1.0.7-67.7.i386", "3AS:tetex-latex-0:1.0.7-67.7.ia64", "3AS:tetex-latex-0:1.0.7-67.7.ppc", "3AS:tetex-latex-0:1.0.7-67.7.s390", "3AS:tetex-latex-0:1.0.7-67.7.s390x", "3AS:tetex-latex-0:1.0.7-67.7.x86_64", "3AS:tetex-xdvi-0:1.0.7-67.7.i386", "3AS:tetex-xdvi-0:1.0.7-67.7.ia64", "3AS:tetex-xdvi-0:1.0.7-67.7.ppc", "3AS:tetex-xdvi-0:1.0.7-67.7.s390", "3AS:tetex-xdvi-0:1.0.7-67.7.s390x", "3AS:tetex-xdvi-0:1.0.7-67.7.x86_64", "3Desktop:tetex-0:1.0.7-67.7.i386", "3Desktop:tetex-0:1.0.7-67.7.ia64", "3Desktop:tetex-0:1.0.7-67.7.ppc", "3Desktop:tetex-0:1.0.7-67.7.s390", "3Desktop:tetex-0:1.0.7-67.7.s390x", "3Desktop:tetex-0:1.0.7-67.7.src", "3Desktop:tetex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-afm-0:1.0.7-67.7.i386", "3Desktop:tetex-afm-0:1.0.7-67.7.ia64", "3Desktop:tetex-afm-0:1.0.7-67.7.ppc", "3Desktop:tetex-afm-0:1.0.7-67.7.s390", "3Desktop:tetex-afm-0:1.0.7-67.7.s390x", "3Desktop:tetex-afm-0:1.0.7-67.7.x86_64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.i386", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ia64", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.ppc", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.s390x", "3Desktop:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3Desktop:tetex-dvips-0:1.0.7-67.7.i386", "3Desktop:tetex-dvips-0:1.0.7-67.7.ia64", "3Desktop:tetex-dvips-0:1.0.7-67.7.ppc", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390", "3Desktop:tetex-dvips-0:1.0.7-67.7.s390x", "3Desktop:tetex-dvips-0:1.0.7-67.7.x86_64", "3Desktop:tetex-fonts-0:1.0.7-67.7.i386", "3Desktop:tetex-fonts-0:1.0.7-67.7.ia64", "3Desktop:tetex-fonts-0:1.0.7-67.7.ppc", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390", "3Desktop:tetex-fonts-0:1.0.7-67.7.s390x", "3Desktop:tetex-fonts-0:1.0.7-67.7.x86_64", "3Desktop:tetex-latex-0:1.0.7-67.7.i386", "3Desktop:tetex-latex-0:1.0.7-67.7.ia64", "3Desktop:tetex-latex-0:1.0.7-67.7.ppc", "3Desktop:tetex-latex-0:1.0.7-67.7.s390", "3Desktop:tetex-latex-0:1.0.7-67.7.s390x", "3Desktop:tetex-latex-0:1.0.7-67.7.x86_64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.i386", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ia64", "3Desktop:tetex-xdvi-0:1.0.7-67.7.ppc", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390", "3Desktop:tetex-xdvi-0:1.0.7-67.7.s390x", "3Desktop:tetex-xdvi-0:1.0.7-67.7.x86_64", "3ES:tetex-0:1.0.7-67.7.i386", "3ES:tetex-0:1.0.7-67.7.ia64", "3ES:tetex-0:1.0.7-67.7.ppc", "3ES:tetex-0:1.0.7-67.7.s390", "3ES:tetex-0:1.0.7-67.7.s390x", "3ES:tetex-0:1.0.7-67.7.src", "3ES:tetex-0:1.0.7-67.7.x86_64", "3ES:tetex-afm-0:1.0.7-67.7.i386", "3ES:tetex-afm-0:1.0.7-67.7.ia64", "3ES:tetex-afm-0:1.0.7-67.7.ppc", "3ES:tetex-afm-0:1.0.7-67.7.s390", "3ES:tetex-afm-0:1.0.7-67.7.s390x", "3ES:tetex-afm-0:1.0.7-67.7.x86_64", "3ES:tetex-debuginfo-0:1.0.7-67.7.i386", "3ES:tetex-debuginfo-0:1.0.7-67.7.ia64", "3ES:tetex-debuginfo-0:1.0.7-67.7.ppc", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390", "3ES:tetex-debuginfo-0:1.0.7-67.7.s390x", "3ES:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3ES:tetex-dvips-0:1.0.7-67.7.i386", "3ES:tetex-dvips-0:1.0.7-67.7.ia64", "3ES:tetex-dvips-0:1.0.7-67.7.ppc", "3ES:tetex-dvips-0:1.0.7-67.7.s390", "3ES:tetex-dvips-0:1.0.7-67.7.s390x", "3ES:tetex-dvips-0:1.0.7-67.7.x86_64", "3ES:tetex-fonts-0:1.0.7-67.7.i386", "3ES:tetex-fonts-0:1.0.7-67.7.ia64", "3ES:tetex-fonts-0:1.0.7-67.7.ppc", "3ES:tetex-fonts-0:1.0.7-67.7.s390", "3ES:tetex-fonts-0:1.0.7-67.7.s390x", "3ES:tetex-fonts-0:1.0.7-67.7.x86_64", "3ES:tetex-latex-0:1.0.7-67.7.i386", "3ES:tetex-latex-0:1.0.7-67.7.ia64", "3ES:tetex-latex-0:1.0.7-67.7.ppc", "3ES:tetex-latex-0:1.0.7-67.7.s390", "3ES:tetex-latex-0:1.0.7-67.7.s390x", "3ES:tetex-latex-0:1.0.7-67.7.x86_64", "3ES:tetex-xdvi-0:1.0.7-67.7.i386", "3ES:tetex-xdvi-0:1.0.7-67.7.ia64", "3ES:tetex-xdvi-0:1.0.7-67.7.ppc", "3ES:tetex-xdvi-0:1.0.7-67.7.s390", "3ES:tetex-xdvi-0:1.0.7-67.7.s390x", "3ES:tetex-xdvi-0:1.0.7-67.7.x86_64", "3WS:tetex-0:1.0.7-67.7.i386", "3WS:tetex-0:1.0.7-67.7.ia64", "3WS:tetex-0:1.0.7-67.7.ppc", "3WS:tetex-0:1.0.7-67.7.s390", "3WS:tetex-0:1.0.7-67.7.s390x", "3WS:tetex-0:1.0.7-67.7.src", "3WS:tetex-0:1.0.7-67.7.x86_64", "3WS:tetex-afm-0:1.0.7-67.7.i386", "3WS:tetex-afm-0:1.0.7-67.7.ia64", "3WS:tetex-afm-0:1.0.7-67.7.ppc", "3WS:tetex-afm-0:1.0.7-67.7.s390", "3WS:tetex-afm-0:1.0.7-67.7.s390x", "3WS:tetex-afm-0:1.0.7-67.7.x86_64", "3WS:tetex-debuginfo-0:1.0.7-67.7.i386", "3WS:tetex-debuginfo-0:1.0.7-67.7.ia64", "3WS:tetex-debuginfo-0:1.0.7-67.7.ppc", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390", "3WS:tetex-debuginfo-0:1.0.7-67.7.s390x", "3WS:tetex-debuginfo-0:1.0.7-67.7.x86_64", "3WS:tetex-dvips-0:1.0.7-67.7.i386", "3WS:tetex-dvips-0:1.0.7-67.7.ia64", "3WS:tetex-dvips-0:1.0.7-67.7.ppc", "3WS:tetex-dvips-0:1.0.7-67.7.s390", "3WS:tetex-dvips-0:1.0.7-67.7.s390x", "3WS:tetex-dvips-0:1.0.7-67.7.x86_64", "3WS:tetex-fonts-0:1.0.7-67.7.i386", "3WS:tetex-fonts-0:1.0.7-67.7.ia64", "3WS:tetex-fonts-0:1.0.7-67.7.ppc", "3WS:tetex-fonts-0:1.0.7-67.7.s390", "3WS:tetex-fonts-0:1.0.7-67.7.s390x", "3WS:tetex-fonts-0:1.0.7-67.7.x86_64", "3WS:tetex-latex-0:1.0.7-67.7.i386", "3WS:tetex-latex-0:1.0.7-67.7.ia64", "3WS:tetex-latex-0:1.0.7-67.7.ppc", "3WS:tetex-latex-0:1.0.7-67.7.s390", "3WS:tetex-latex-0:1.0.7-67.7.s390x", "3WS:tetex-latex-0:1.0.7-67.7.x86_64", "3WS:tetex-xdvi-0:1.0.7-67.7.i386", "3WS:tetex-xdvi-0:1.0.7-67.7.ia64", "3WS:tetex-xdvi-0:1.0.7-67.7.ppc", "3WS:tetex-xdvi-0:1.0.7-67.7.s390", "3WS:tetex-xdvi-0:1.0.7-67.7.s390x", "3WS:tetex-xdvi-0:1.0.7-67.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:354" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_577
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libtiff packages that fix various buffer and integer overflows are\nnow available.", "title": "Topic" }, { "category": "general", "text": "The libtiff package contains a library of functions for manipulating TIFF\n(Tagged Image File Format) image format files. TIFF is a widely used file\nformat for bitmapped images. \n\nDuring a source code audit, Chris Evans discovered a number of integer\noverflow bugs that affect libtiff. An attacker who has the ability to trick\na user into opening a malicious TIFF file could cause the application\nlinked to libtiff to crash or possibly execute arbitrary code. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nnames CAN-2004-0886 and CAN-2004-0804 to these issues.\n\nAdditionally, a number of buffer overflow bugs that affect libtiff have\nbeen found. An attacker who has the ability to trick a user into opening a\nmalicious TIFF file could cause the application linked to libtiff to crash\nor possibly execute arbitrary code. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0803 to\nthis issue.\n\nAll users are advised to upgrade to these errata packages, which contain\nfixes for these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:577", "url": "https://access.redhat.com/errata/RHSA-2004:577" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "134847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134847" }, { "category": "external", "summary": "134850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134850" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_577.json" } ], "title": "Red Hat Security Advisory: libtiff security update", "tracking": { "current_release_date": "2024-11-21T23:16:36+00:00", "generator": { "date": "2024-11-21T23:16:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:577", "initial_release_date": "2004-10-22T15:04:00+00:00", "revision_history": [ { "date": "2004-10-22T15:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-10-22T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:16:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=ia64" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.ia64", "product": { "name": "libtiff-devel-0:3.5.7-20.1.ia64", "product_id": "libtiff-devel-0:3.5.7-20.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=ia64" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.ia64", "product": { "name": "libtiff-0:3.5.7-20.1.ia64", "product_id": "libtiff-0:3.5.7-20.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.i386", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.i386", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=i386" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.i386", "product": { "name": "libtiff-0:3.5.7-20.1.i386", "product_id": "libtiff-0:3.5.7-20.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=i386" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.i386", "product": { "name": "libtiff-devel-0:3.5.7-20.1.i386", "product_id": "libtiff-devel-0:3.5.7-20.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.x86_64", "product": { "name": "libtiff-devel-0:3.5.7-20.1.x86_64", "product_id": "libtiff-devel-0:3.5.7-20.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.x86_64", "product": { "name": "libtiff-0:3.5.7-20.1.x86_64", "product_id": "libtiff-0:3.5.7-20.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.src", "product": { "name": "libtiff-0:3.5.7-20.1.src", "product_id": "libtiff-0:3.5.7-20.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=ppc64" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.ppc64", "product": { "name": "libtiff-0:3.5.7-20.1.ppc64", "product_id": "libtiff-0:3.5.7-20.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=ppc" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.ppc", "product": { "name": "libtiff-devel-0:3.5.7-20.1.ppc", "product_id": "libtiff-devel-0:3.5.7-20.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=ppc" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.ppc", "product": { "name": "libtiff-0:3.5.7-20.1.ppc", "product_id": "libtiff-0:3.5.7-20.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.s390x", "product": { "name": "libtiff-devel-0:3.5.7-20.1.s390x", "product_id": "libtiff-devel-0:3.5.7-20.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.s390x", "product": { "name": "libtiff-0:3.5.7-20.1.s390x", "product_id": "libtiff-0:3.5.7-20.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libtiff-debuginfo-0:3.5.7-20.1.s390", "product": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390", "product_id": "libtiff-debuginfo-0:3.5.7-20.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@3.5.7-20.1?arch=s390" } } }, { "category": "product_version", "name": "libtiff-0:3.5.7-20.1.s390", "product": { "name": "libtiff-0:3.5.7-20.1.s390", "product_id": "libtiff-0:3.5.7-20.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@3.5.7-20.1?arch=s390" } } }, { "category": "product_version", "name": "libtiff-devel-0:3.5.7-20.1.s390", "product": { "name": "libtiff-devel-0:3.5.7-20.1.s390", "product_id": "libtiff-devel-0:3.5.7-20.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@3.5.7-20.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-0:3.5.7-20.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-0:3.5.7-20.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.src" }, "product_reference": "libtiff-0:3.5.7-20.1.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:libtiff-devel-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-0:3.5.7-20.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-0:3.5.7-20.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.src" }, "product_reference": "libtiff-0:3.5.7-20.1.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-0:3.5.7-20.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-0:3.5.7-20.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.src" }, "product_reference": "libtiff-0:3.5.7-20.1.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:libtiff-devel-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-0:3.5.7-20.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-0:3.5.7-20.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.src" }, "product_reference": "libtiff-0:3.5.7-20.1.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-debuginfo-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.i386" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.ia64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.ppc" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.s390" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.s390x" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:3.5.7-20.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" }, "product_reference": "libtiff-devel-0:3.5.7-20.1.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0803", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617294" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0803" }, { "category": "external", "summary": "RHBZ#1617294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617294" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0803", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0803" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-22T15:04:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:577" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0804", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617295" } ], "notes": [ { "category": "description", "text": "Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0804" }, { "category": "external", "summary": "RHBZ#1617295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0804", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0804" } ], "release_date": "2002-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-22T15:04:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:577" } ], "title": "security flaw" }, { "cve": "CVE-2004-0886", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617314" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0886" }, { "category": "external", "summary": "RHBZ#1617314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617314" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0886", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0886" } ], "release_date": "2004-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-22T15:04:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:577" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1307", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617405" } ], "notes": [ { "category": "description", "text": "Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was resolved in all affected libtiff versions as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 via a patch for CVE-2004-0886. For updates containing patches for CVE-2004-0886, see: https://rhn.redhat.com/errata/CVE-2004-0886.html", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1307" }, { "category": "external", "summary": "RHBZ#1617405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1307", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1307" } ], "release_date": "2004-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-10-22T15:04:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:libtiff-0:3.5.7-20.1.i386", "3AS:libtiff-0:3.5.7-20.1.ia64", "3AS:libtiff-0:3.5.7-20.1.ppc", "3AS:libtiff-0:3.5.7-20.1.ppc64", "3AS:libtiff-0:3.5.7-20.1.s390", "3AS:libtiff-0:3.5.7-20.1.s390x", "3AS:libtiff-0:3.5.7-20.1.src", "3AS:libtiff-0:3.5.7-20.1.x86_64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3AS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3AS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3AS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3AS:libtiff-devel-0:3.5.7-20.1.i386", "3AS:libtiff-devel-0:3.5.7-20.1.ia64", "3AS:libtiff-devel-0:3.5.7-20.1.ppc", "3AS:libtiff-devel-0:3.5.7-20.1.s390", "3AS:libtiff-devel-0:3.5.7-20.1.s390x", "3AS:libtiff-devel-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-0:3.5.7-20.1.i386", "3Desktop:libtiff-0:3.5.7-20.1.ia64", "3Desktop:libtiff-0:3.5.7-20.1.ppc", "3Desktop:libtiff-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-0:3.5.7-20.1.s390", "3Desktop:libtiff-0:3.5.7-20.1.s390x", "3Desktop:libtiff-0:3.5.7-20.1.src", "3Desktop:libtiff-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.i386", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3Desktop:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3Desktop:libtiff-devel-0:3.5.7-20.1.i386", "3Desktop:libtiff-devel-0:3.5.7-20.1.ia64", "3Desktop:libtiff-devel-0:3.5.7-20.1.ppc", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390", "3Desktop:libtiff-devel-0:3.5.7-20.1.s390x", "3Desktop:libtiff-devel-0:3.5.7-20.1.x86_64", "3ES:libtiff-0:3.5.7-20.1.i386", "3ES:libtiff-0:3.5.7-20.1.ia64", "3ES:libtiff-0:3.5.7-20.1.ppc", "3ES:libtiff-0:3.5.7-20.1.ppc64", "3ES:libtiff-0:3.5.7-20.1.s390", "3ES:libtiff-0:3.5.7-20.1.s390x", "3ES:libtiff-0:3.5.7-20.1.src", "3ES:libtiff-0:3.5.7-20.1.x86_64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.i386", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3ES:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390", "3ES:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3ES:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3ES:libtiff-devel-0:3.5.7-20.1.i386", "3ES:libtiff-devel-0:3.5.7-20.1.ia64", "3ES:libtiff-devel-0:3.5.7-20.1.ppc", "3ES:libtiff-devel-0:3.5.7-20.1.s390", "3ES:libtiff-devel-0:3.5.7-20.1.s390x", "3ES:libtiff-devel-0:3.5.7-20.1.x86_64", "3WS:libtiff-0:3.5.7-20.1.i386", "3WS:libtiff-0:3.5.7-20.1.ia64", "3WS:libtiff-0:3.5.7-20.1.ppc", "3WS:libtiff-0:3.5.7-20.1.ppc64", "3WS:libtiff-0:3.5.7-20.1.s390", "3WS:libtiff-0:3.5.7-20.1.s390x", "3WS:libtiff-0:3.5.7-20.1.src", "3WS:libtiff-0:3.5.7-20.1.x86_64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.i386", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ia64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc", "3WS:libtiff-debuginfo-0:3.5.7-20.1.ppc64", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390", "3WS:libtiff-debuginfo-0:3.5.7-20.1.s390x", "3WS:libtiff-debuginfo-0:3.5.7-20.1.x86_64", "3WS:libtiff-devel-0:3.5.7-20.1.i386", "3WS:libtiff-devel-0:3.5.7-20.1.ia64", "3WS:libtiff-devel-0:3.5.7-20.1.ppc", "3WS:libtiff-devel-0:3.5.7-20.1.s390", "3WS:libtiff-devel-0:3.5.7-20.1.s390x", "3WS:libtiff-devel-0:3.5.7-20.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:577" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
gsd-2004-0886
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0886", "description": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "id": "GSD-2004-0886", "references": [ "https://www.suse.com/security/cve/CVE-2004-0886.html", "https://www.debian.org/security/2004/dsa-567", "https://access.redhat.com/errata/RHSA-2005:354", "https://access.redhat.com/errata/RHSA-2005:021", "https://access.redhat.com/errata/RHSA-2004:577" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0886" ], "details": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.", "id": "GSD-2004-0886", "modified": "2023-12-13T01:22:54.503688Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0886", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:577", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "name": "MDKSA-2004:109", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "name": "RHSA-2005:021", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "name": "P-015", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "name": "201072", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "name": "oval:org.mitre.oval:def:9907", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "name": "101677", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "name": "SUSE-SA:2004:038", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "name": "VU#687568", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/687568" }, { "name": "1011674", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011674" }, { "name": "CLA-2004:888", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "name": "MDKSA-2005:052", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "name": "libtiff-bo(17715)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://www.kde.org/info/security/advisory-20041209-2.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "name": "RHSA-2005:354", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "name": "12818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12818" }, { "name": "11406", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11406" }, { "name": "oval:org.mitre.oval:def:100116", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" }, { "name": "DSA-567", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-567" }, { "name": "OpenPKG-SA-2004.043", "refsource": "OPENPKG", "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wxgtk2:wxgtk2:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0886" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:577", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-577.html" }, { "name": "11406", "refsource": "BID", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11406" }, { "name": "http://www.kde.org/info/security/advisory-20041209-2.txt", "refsource": "CONFIRM", "tags": [], "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "name": "DSA-567", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-567" }, { "name": "RHSA-2005:354", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "name": "SUSE-SA:2004:038", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "name": "2004-0054", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "VU#687568", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/687568" }, { "name": "P-015", "refsource": "CIAC", "tags": [], "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "name": "12818", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/12818" }, { "name": "1011674", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1011674" }, { "name": "RHSA-2005:021", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-021.html" }, { "name": "CLA-2004:888", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "name": "101677", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "name": "MDKSA-2004:109", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:109" }, { "name": "MDKSA-2005:052", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052" }, { "name": "201072", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "name": "OpenPKG-SA-2004.043", "refsource": "OPENPKG", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" }, { "name": "libtiff-bo(17715)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "name": "oval:org.mitre.oval:def:9907", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907" }, { "name": "oval:org.mitre.oval:def:100116", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2005-01-27T05:00Z" } } }
var-200501-0287
Vulnerability from variot
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls. Apple Mac OS X with Bluetooth support may unintentionally allow files to be exchanged with other systems by default. Apple Mac OS X Directory Service utilities use external programs insecurely, potentially allowing an attacker to execute arbitrary code. Multiple integer overflows in the LibTIFF library may allow an attacker to execute arbitrary code. Multiple integer overflows in the LibTIFF library may allow an attacker to execute arbitrary code. LibTIFF is affected by multiple buffer-overflow vulnerabilities because the software fails to properly perform boundary checks before copying user-supplied strings into finite process buffers. An attacker may leverage these issues to execute arbitrary code on a vulnerable computer with the privileges of the user running a vulnerable application, facilitating unauthorized access. The attacker may also leverage these issues to crash the affected application. libtiff is an application library responsible for encoding/decoding the TIFF image format. Impacts of other vulnerabilities addressed by the update include disclosure of information and denial of service.
I. Description
Apple Security Update 2005-005 resolves a number of vulnerabilities affecting Mac OS X and OS X Server. (CAN-2004-0594)
Please note that Apple Security Update 2005-005 addresses additional vulnerabilities not described above. As further information becomes available, we will publish individual Vulnerability Notes.
II. Impact
The impacts of these vulnerabilities vary, for information about specific impacts please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, disclosure of sensitive information, and denial of service.
III. Solution
Install an Update
Install the update as described in Apple Security Update 2005-005.
Appendix A. References
* US-CERT Vulnerability Note VU#582934 -
<http://www.kb.cert.org/vuls/id/582934>
* US-CERT Vulnerability Note VU#258390 -
<http://www.kb.cert.org/vuls/id/258390>
* US-CERT Vulnerability Note VU#331694 -
<http://www.kb.cert.org/vuls/id/331694>
* US-CERT Vulnerability Note VU#706838 -
<http://www.kb.cert.org/vuls/id/706838>
* US-CERT Vulnerability Note VU#539110 -
<http://www.kb.cert.org/vuls/id/539110>
* US-CERT Vulnerability Note VU#354486 -
<http://www.kb.cert.org/vuls/id/354486>
* US-CERT Vulnerability Note VU#882750 -
<http://www.kb.cert.org/vuls/id/882750>
* US-CERT Vulnerability Note VU#537878 -
<http://www.kb.cert.org/vuls/id/537878>
* US-CERT Vulnerability Note VU#125598 -
<http://www.kb.cert.org/vuls/id/125598>
* US-CERT Vulnerability Note VU#356070 -
<http://www.kb.cert.org/vuls/id/356070>
* Apple Security Update 2005-005 -
<http://docs.info.apple.com/article.html?artnum=301528>
These vulnerabilities were discovered by several people and reported in Apple Security Update 2005-005. Please see the Vulnerability Notes for individual reporter acknowledgements.
Feedback can be directed to the authors: Jeffrey Gennari and Jason Rafail.
Copyright 2005 Carnegie Mellon University. Terms of use
Revision History
May 16, 2005: Initial release Last updated May 16, 2005 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBQojwRBhoSezw4YfQAQKb1gf/a7XQAZQR+t5+FpzRoUrJyVIg3Mf1IISP yS5GLgfwC+4GuDEd/BA51+591OhNAWa1hO2JAUQwJ799VL7vAY6vbDW84c+S0eQ+ J+FHgddUsuvRtmsXCg2Fin1JRG4hCqBQ9q2S0h4+fM7yWSdLOY7xeAAwPOwG+bsU AVjDMNiPACHxw7CNQ8qpPXFfo3qrV+oj55F62TbR0fujtil6yQR3lE9wSeiuLs/i KgQFZlHMEoAwQnghwLk7eQLkzGD9eAZ+pZ7Ny0AvF7avhGflh2nFNe2acFoJ2Iw7 /gMXj/uN/ZpDssS37y38LIvyA3kIQrSlEW7iKf1wi2eQ3ntjyv/9NA== =uqBU -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 567-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 15th, 2004 http://www.debian.org/security/faq
Package : tiff Vulnerability : heap overflows Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-0803 CAN-2004-0804 CAN-2004-0886
Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. The Common Vulnerabilities and Exposures Project has identified the following problems:
CAN-2004-0803
Chris Evans discovered several problems in the RLE (run length
encoding) decoders that could lead to arbitrary code execution.
CAN-2004-0804
Matthias Clasen discovered a division by zero through an integer
overflow.
CAN-2004-0886
Dmitry V.
For the stable distribution (woody) these problems have been fixed in version 3.5.5-6woody1.
For the unstable distribution (sid) these problems have been fixed in version 3.6.1-2.
We recommend that you upgrade your libtiff package.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.dsc
Size/MD5 checksum: 635 11a374e916d818c05a373feb04cab6a0
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.diff.gz
Size/MD5 checksum: 36717 6f4d137f7c935d57757313a610dbd389
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5.orig.tar.gz
Size/MD5 checksum: 693641 3b7199ba793dec6ca88f38bb0c8cc4d8
Alpha architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_alpha.deb
Size/MD5 checksum: 141424 18b6e6b621178c1419de8a13a0a62366
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_alpha.deb
Size/MD5 checksum: 105148 875257fb73ba05a575d06650c130a545
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_alpha.deb
Size/MD5 checksum: 423194 9796f3e82553cedb237f1b574570f143
ARM architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_arm.deb
Size/MD5 checksum: 116928 5ed91b9586d830e8da9a5086fc5a6e76
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_arm.deb
Size/MD5 checksum: 90466 f04c381a418fd33602d1ba30158597d3
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_arm.deb
Size/MD5 checksum: 404262 30f13bfdf54cfca30ee5ca0f6c6d0e4e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_i386.deb
Size/MD5 checksum: 112068 d15dfdf84f010be08799d456726e1d9d
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_i386.deb
Size/MD5 checksum: 81054 293f5c99f0a589917257ec7fee0b92fe
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_i386.deb
Size/MD5 checksum: 387052 9606adb1668decf5ac1ee02a94298e85
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_ia64.deb
Size/MD5 checksum: 158774 80c1b7ad68ecc78091ea95414125e81c
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_ia64.deb
Size/MD5 checksum: 135386 b17f87aa0ad98fc50aa8c137a6f5089c
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_ia64.deb
Size/MD5 checksum: 446496 757f3b6cc9d3f1ec5a2dfb1c3485caf3
HP Precision architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_hppa.deb
Size/MD5 checksum: 128298 46dece015f0282bca0af7f6e740e9d31
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_hppa.deb
Size/MD5 checksum: 106788 b837005b41c54c341cbd61e8fdb581ff
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_hppa.deb
Size/MD5 checksum: 420346 3a2b91ee22af99eec3ab42d81cf9d59f
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_m68k.deb
Size/MD5 checksum: 107302 0c702a3e5c2ad7ad7bd96dae64fa2d61
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_m68k.deb
Size/MD5 checksum: 79770 d67f4347d35bf898a6ab1914cb53a42f
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_m68k.deb
Size/MD5 checksum: 380218 42e6f07cf2e70de01ca40ac4a97254bf
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mips.deb
Size/MD5 checksum: 124048 85d8c8cbb62cc62c876bf4ed721027cf
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mips.deb
Size/MD5 checksum: 87840 5f3312f22b0f345c7eae434f5b871993
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mips.deb
Size/MD5 checksum: 410770 be817ddffa91c423b55fda3388d7ce48
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mipsel.deb
Size/MD5 checksum: 123558 42594e9270de16ff802c11eccf7a0efb
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mipsel.deb
Size/MD5 checksum: 88198 a8f0abe9205431caf94dce77d11ac477
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mipsel.deb
Size/MD5 checksum: 410860 68a12ef6d37fc575105c4ceb9b766949
PowerPC architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_powerpc.deb
Size/MD5 checksum: 116042 2258da94549ae05ffae643bc40790487
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_powerpc.deb
Size/MD5 checksum: 89424 c8d782561a299ffb65ea84b59d88117a
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_powerpc.deb
Size/MD5 checksum: 402372 1eca24adda52b40c7a8d789fdeb3cb2e
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_s390.deb
Size/MD5 checksum: 116870 dcddc86a0d96296c07076391adc9d754
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_s390.deb
Size/MD5 checksum: 91742 40c1de704b191e4abb65af8a4b7fd75d
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_s390.deb
Size/MD5 checksum: 395332 86d351b75f1f146ddad6d562ca77005c
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_sparc.deb
Size/MD5 checksum: 132888 9ed9db78d727ba8bfbb25c1e68b03bf2
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_sparc.deb
Size/MD5 checksum: 88556 a4069600bd9295a27d4eb6e9e0995495
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_sparc.deb
Size/MD5 checksum: 397026 149e12055c5711129552fa938b5af431
These files will probably be moved into the stable distribution on its next update. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00600177 Version: 1
HPSBUX02119 SSRT4848 rev.1 - HP-UX Running Motif Applications Remote Arbitrary Code Execution, Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
References: CERT VU#537878, VU#882750
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.00, B.11.11, B.11.23 running Motif applications.
BACKGROUND
Potential vulnerabilities have been reported with the handling of XPixMap format data: http://www.kb.cert.org/vuls/id/882750 http://www.kb.cert.org/vuls/id/537878
AFFECTED VERSIONS
HP-UX B.11.00
X11.MOTIF-SHLIB action: install PHSS_33129 or subsequent
HP-UX B.11.11
X11.MOTIF-SHLIB action: install PHSS_33130 or subsequent
HP-UX B.11.23
X11.MOTIF-SHLIB action: install PHSS_33132 or subsequent
RESOLUTION HP has made the following patches available to resolve the issue. The patches can be downloaded from http://itrc.hp.com
HP-UX B.11.00 PHSS_33129 or subsequent HP-UX B.11.11 PHSS_33130 or subsequent HP-UX B.11.23 PHSS_33132 or subsequent
MANUAL ACTIONS: No
PRODUCT SPECIFIC INFORMATION
HP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA
HISTORY Version:1 (rev.1) 17 May 2006 Initial release
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com. It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA& langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
-
The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW, MA = HP Management Agents, MI = Misc. 3rd party SW, MP = HP MPE/iX, NS = HP NonStop Servers, OV = HP OpenVMS, PI = HP Printing & Imaging, ST = HP Storage SW, TL = HP Trusted Linux, TU = HP Tru64 UNIX, UX = HP-UX, VV = HP Virtual Vault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
(c)Copyright 2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 6.4, "vendor": "apple computer", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "2.1" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.1" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.0" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "1.5" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "suse", "version": "8.1" }, { "model": "pdf library", "scope": "eq", "trust": 1.3, "vendor": "pdflib", "version": "5.0.2" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.6.1" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.6.0" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.7" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.5" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.4" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.3" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.2" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.5.1" }, { "model": "libtiff", "scope": "eq", "trust": 1.3, "vendor": "libtiff", "version": "3.4" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.3.1" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.3" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.2.3" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.2.2" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.2.1" }, { "model": "kde", "scope": "eq", "trust": 1.3, "vendor": "kde", "version": "3.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.8" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.6" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.5" }, { "model": "fedora core", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "core_2.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.5" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.6" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.6" }, { "model": "wxgtk2", "scope": "eq", "trust": 1.0, "vendor": "wxgtk2", "version": "2.5_.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.4" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.4" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.3" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.5" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.4" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.4" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.2" }, { "model": "wxgtk2", "scope": "eq", "trust": 1.0, "vendor": "wxgtk2", "version": "*" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.7" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.7" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "8" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "8.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "turbolinux", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10_f" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (hosting)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (workgroup)" }, { "model": "turbolinux desktop", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "home", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "wxgtk2", "scope": "eq", "trust": 0.3, "vendor": "wxgtk2", "version": "2.5.0" }, { "model": "wxgtk2", "scope": null, "trust": 0.3, "vendor": "wxgtk2", "version": null }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "tetex", "scope": "eq", "trust": 0.3, "vendor": "tetex", "version": "1.0.7" }, { "model": "tetex", "scope": "eq", "trust": 0.3, "vendor": "tetex", "version": "1.0.6" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.0" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 10.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.4" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "fedora core2", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "do not use", "scope": null, "trust": 0.3, "vendor": "libtiff", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "modular messaging s3400", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "pdf library p1", "scope": "ne", "trust": 0.3, "vendor": "pdflib", "version": "5.0.4" }, { "model": "kde", "scope": "ne", "trust": 0.3, "vendor": "kde", "version": "3.3.2" } ], "sources": [ { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "BID", "id": "11406" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "CNNVD", "id": "CNNVD-200501-308" }, { "db": "NVD", "id": "CVE-2004-0886" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_home", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000445" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "chris chris@cr-secure.net", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-308" } ], "trust": 0.6 }, "cve": "CVE-2004-0886", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2004-0886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-9316", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CARNEGIE MELLON", "id": "VU#687568", "trust": 1.6, "value": "10.33" }, { "author": "nvd@nist.gov", "id": "CVE-2004-0886", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#354486", "trust": 0.8, "value": "10.69" }, { "author": "CARNEGIE MELLON", "id": "VU#258390", "trust": 0.8, "value": "2.03" }, { "author": "CARNEGIE MELLON", "id": "VU#356070", "trust": 0.8, "value": "22.31" }, { "author": "CARNEGIE MELLON", "id": "VU#539110", "trust": 0.8, "value": "5.04" }, { "author": "CARNEGIE MELLON", "id": "VU#706838", "trust": 0.8, "value": "9.38" }, { "author": "CARNEGIE MELLON", "id": "VU#331694", "trust": 0.8, "value": "15.94" }, { "author": "NVD", "id": "CVE-2004-0886", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200501-308", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9316", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "VULHUB", "id": "VHN-9316" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "CNNVD", "id": "CNNVD-200501-308" }, { "db": "NVD", "id": "CVE-2004-0886" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls. Apple Mac OS X with Bluetooth support may unintentionally allow files to be exchanged with other systems by default. Apple Mac OS X Directory Service utilities use external programs insecurely, potentially allowing an attacker to execute arbitrary code. Multiple integer overflows in the LibTIFF library may allow an attacker to execute arbitrary code. Multiple integer overflows in the LibTIFF library may allow an attacker to execute arbitrary code. LibTIFF is affected by multiple buffer-overflow vulnerabilities because the software fails to properly perform boundary checks before copying user-supplied strings into finite process buffers. \nAn attacker may leverage these issues to execute arbitrary code on a vulnerable computer with the privileges of the user running a vulnerable application, facilitating unauthorized access. The attacker may also leverage these issues to crash the affected application. libtiff is an application library responsible for encoding/decoding the TIFF image format. Impacts of other vulnerabilities addressed by\n the update include disclosure of information and denial of service. \n\nI. Description\n\n Apple Security Update 2005-005 resolves a number of vulnerabilities\n affecting Mac OS X and OS X Server. \n (CAN-2004-0594)\n \n Please note that Apple Security Update 2005-005 addresses additional\n vulnerabilities not described above. As further information becomes\n available, we will publish individual Vulnerability Notes. \n\nII. Impact\n\n The impacts of these vulnerabilities vary, for information about\n specific impacts please see the Vulnerability Notes. Potential\n consequences include remote execution of arbitrary code or commands,\n disclosure of sensitive information, and denial of service. \n\nIII. Solution\n\nInstall an Update\n\n Install the update as described in Apple Security Update 2005-005. \n\nAppendix A. References\n\n * US-CERT Vulnerability Note VU#582934 -\n \u003chttp://www.kb.cert.org/vuls/id/582934\u003e\n \n * US-CERT Vulnerability Note VU#258390 -\n \u003chttp://www.kb.cert.org/vuls/id/258390\u003e\n \n * US-CERT Vulnerability Note VU#331694 -\n \u003chttp://www.kb.cert.org/vuls/id/331694\u003e\n\n * US-CERT Vulnerability Note VU#706838 -\n \u003chttp://www.kb.cert.org/vuls/id/706838\u003e\n\n * US-CERT Vulnerability Note VU#539110 -\n \u003chttp://www.kb.cert.org/vuls/id/539110\u003e\n\n * US-CERT Vulnerability Note VU#354486 -\n \u003chttp://www.kb.cert.org/vuls/id/354486\u003e\n\n * US-CERT Vulnerability Note VU#882750 -\n \u003chttp://www.kb.cert.org/vuls/id/882750\u003e\n\n * US-CERT Vulnerability Note VU#537878 -\n \u003chttp://www.kb.cert.org/vuls/id/537878\u003e\n\n * US-CERT Vulnerability Note VU#125598 -\n \u003chttp://www.kb.cert.org/vuls/id/125598\u003e\n\n * US-CERT Vulnerability Note VU#356070 -\n \u003chttp://www.kb.cert.org/vuls/id/356070\u003e\n\n * Apple Security Update 2005-005 -\n \u003chttp://docs.info.apple.com/article.html?artnum=301528\u003e\n _________________________________________________________________\n\n These vulnerabilities were discovered by several people and reported\n in Apple Security Update 2005-005. Please see the Vulnerability Notes\n for individual reporter acknowledgements. \n _________________________________________________________________\n\n Feedback can be directed to the authors: Jeffrey Gennari and Jason\n Rafail. \n _________________________________________________________________\n\n Copyright 2005 Carnegie Mellon University. Terms of use\n\n Revision History\n\n May 16, 2005: Initial release\n Last updated May 16, 2005 \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBQojwRBhoSezw4YfQAQKb1gf/a7XQAZQR+t5+FpzRoUrJyVIg3Mf1IISP\nyS5GLgfwC+4GuDEd/BA51+591OhNAWa1hO2JAUQwJ799VL7vAY6vbDW84c+S0eQ+\nJ+FHgddUsuvRtmsXCg2Fin1JRG4hCqBQ9q2S0h4+fM7yWSdLOY7xeAAwPOwG+bsU\nAVjDMNiPACHxw7CNQ8qpPXFfo3qrV+oj55F62TbR0fujtil6yQR3lE9wSeiuLs/i\nKgQFZlHMEoAwQnghwLk7eQLkzGD9eAZ+pZ7Ny0AvF7avhGflh2nFNe2acFoJ2Iw7\n/gMXj/uN/ZpDssS37y38LIvyA3kIQrSlEW7iKf1wi2eQ3ntjyv/9NA==\n=uqBU\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 567-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nOctober 15th, 2004 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : tiff\nVulnerability : heap overflows\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CAN-2004-0803 CAN-2004-0804 CAN-2004-0886\n\nSeveral problems have been discovered in libtiff, the Tag Image File\nFormat library for processing TIFF graphics files. The Common Vulnerabilities and\nExposures Project has identified the following problems:\n\nCAN-2004-0803\n\n Chris Evans discovered several problems in the RLE (run length\n encoding) decoders that could lead to arbitrary code execution. \n\nCAN-2004-0804\n\n Matthias Clasen discovered a division by zero through an integer\n overflow. \n\nCAN-2004-0886\n\n Dmitry V. \n\n\nFor the stable distribution (woody) these problems have been fixed in\nversion 3.5.5-6woody1. \n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 3.6.1-2. \n\nWe recommend that you upgrade your libtiff package. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.dsc\n Size/MD5 checksum: 635 11a374e916d818c05a373feb04cab6a0\n http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.diff.gz\n Size/MD5 checksum: 36717 6f4d137f7c935d57757313a610dbd389\n http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5.orig.tar.gz\n Size/MD5 checksum: 693641 3b7199ba793dec6ca88f38bb0c8cc4d8\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_alpha.deb\n Size/MD5 checksum: 141424 18b6e6b621178c1419de8a13a0a62366\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_alpha.deb\n Size/MD5 checksum: 105148 875257fb73ba05a575d06650c130a545\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_alpha.deb\n Size/MD5 checksum: 423194 9796f3e82553cedb237f1b574570f143\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_arm.deb\n Size/MD5 checksum: 116928 5ed91b9586d830e8da9a5086fc5a6e76\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_arm.deb\n Size/MD5 checksum: 90466 f04c381a418fd33602d1ba30158597d3\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_arm.deb\n Size/MD5 checksum: 404262 30f13bfdf54cfca30ee5ca0f6c6d0e4e\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_i386.deb\n Size/MD5 checksum: 112068 d15dfdf84f010be08799d456726e1d9d\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_i386.deb\n Size/MD5 checksum: 81054 293f5c99f0a589917257ec7fee0b92fe\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_i386.deb\n Size/MD5 checksum: 387052 9606adb1668decf5ac1ee02a94298e85\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_ia64.deb\n Size/MD5 checksum: 158774 80c1b7ad68ecc78091ea95414125e81c\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_ia64.deb\n Size/MD5 checksum: 135386 b17f87aa0ad98fc50aa8c137a6f5089c\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_ia64.deb\n Size/MD5 checksum: 446496 757f3b6cc9d3f1ec5a2dfb1c3485caf3\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_hppa.deb\n Size/MD5 checksum: 128298 46dece015f0282bca0af7f6e740e9d31\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_hppa.deb\n Size/MD5 checksum: 106788 b837005b41c54c341cbd61e8fdb581ff\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_hppa.deb\n Size/MD5 checksum: 420346 3a2b91ee22af99eec3ab42d81cf9d59f\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_m68k.deb\n Size/MD5 checksum: 107302 0c702a3e5c2ad7ad7bd96dae64fa2d61\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_m68k.deb\n Size/MD5 checksum: 79770 d67f4347d35bf898a6ab1914cb53a42f\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_m68k.deb\n Size/MD5 checksum: 380218 42e6f07cf2e70de01ca40ac4a97254bf\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mips.deb\n Size/MD5 checksum: 124048 85d8c8cbb62cc62c876bf4ed721027cf\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mips.deb\n Size/MD5 checksum: 87840 5f3312f22b0f345c7eae434f5b871993\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mips.deb\n Size/MD5 checksum: 410770 be817ddffa91c423b55fda3388d7ce48\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mipsel.deb\n Size/MD5 checksum: 123558 42594e9270de16ff802c11eccf7a0efb\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mipsel.deb\n Size/MD5 checksum: 88198 a8f0abe9205431caf94dce77d11ac477\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mipsel.deb\n Size/MD5 checksum: 410860 68a12ef6d37fc575105c4ceb9b766949\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_powerpc.deb\n Size/MD5 checksum: 116042 2258da94549ae05ffae643bc40790487\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_powerpc.deb\n Size/MD5 checksum: 89424 c8d782561a299ffb65ea84b59d88117a\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_powerpc.deb\n Size/MD5 checksum: 402372 1eca24adda52b40c7a8d789fdeb3cb2e\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_s390.deb\n Size/MD5 checksum: 116870 dcddc86a0d96296c07076391adc9d754\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_s390.deb\n Size/MD5 checksum: 91742 40c1de704b191e4abb65af8a4b7fd75d\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_s390.deb\n Size/MD5 checksum: 395332 86d351b75f1f146ddad6d562ca77005c\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_sparc.deb\n Size/MD5 checksum: 132888 9ed9db78d727ba8bfbb25c1e68b03bf2\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_sparc.deb\n Size/MD5 checksum: 88556 a4069600bd9295a27d4eb6e9e0995495\n http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_sparc.deb\n Size/MD5 checksum: 397026 149e12055c5711129552fa938b5af431\n\n\n These files will probably be moved into the stable distribution on\n its next update. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c00600177\nVersion: 1\n\nHPSBUX02119 SSRT4848 rev.1 - HP-UX Running Motif Applications Remote Arbitrary \nCode Execution, Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nReferences: CERT VU#537878, VU#882750 \n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.00, B.11.11, B.11.23 running Motif applications. \n\nBACKGROUND\n\nPotential vulnerabilities have been reported with the handling of XPixMap format data:\nhttp://www.kb.cert.org/vuls/id/882750 \nhttp://www.kb.cert.org/vuls/id/537878 \n\nAFFECTED VERSIONS\n\nHP-UX B.11.00\n=============\nX11.MOTIF-SHLIB\naction: install PHSS_33129 or subsequent\n\nHP-UX B.11.11\n=============\nX11.MOTIF-SHLIB\naction: install PHSS_33130 or subsequent\n\nHP-UX B.11.23\n=============\nX11.MOTIF-SHLIB\naction: install PHSS_33132 or subsequent\n\nRESOLUTION\nHP has made the following patches available to resolve the issue. \nThe patches can be downloaded from http://itrc.hp.com \n\nHP-UX B.11.00 PHSS_33129 or subsequent \nHP-UX B.11.11 PHSS_33130 or subsequent \nHP-UX B.11.23 PHSS_33132 or subsequent \n\nMANUAL ACTIONS: No\n\nPRODUCT SPECIFIC INFORMATION \n\nHP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all\nHP-issued Security Bulletins to provide a subset of recommended actions that \npotentially affect a specific HP-UX system. For more information: \nhttp://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA \n\nHISTORY \nVersion:1 (rev.1) 17 May 2006 Initial release\n\nSupport: For further information, contact normal HP Services\nsupport channel. \n\nReport: To report a potential security vulnerability with any HP\nsupported product, send Email to: security-alert@hp.com. It is\nstrongly recommended that security related information being\ncommunicated to HP be encrypted using PGP, especially exploit\ninformation. To get the security-alert PGP key, please send an\ne-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP\nSecurity Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026\nlangcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\n\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n - check ALL categories for which alerts are required and\n continue. \nUnder Step2: your ITRC operating systems\n - verify your operating system selections are checked and\n save. \n\nTo update an existing subscription:\nhttp://h30046.www3.hp.com/subSignIn.php\nLog in on the web page:\n Subscriber\u0027s choice for Business: sign-in. \nOn the web page:\n Subscriber\u0027s Choice: your profile summary\n - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit:\nhttp://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters of the\nBulletin number in the title:\n\n GN = HP General SW,\n MA = HP Management Agents,\n MI = Misc. 3rd party SW,\n MP = HP MPE/iX,\n NS = HP NonStop Servers,\n OV = HP OpenVMS,\n PI = HP Printing \u0026 Imaging,\n ST = HP Storage SW,\n TL = HP Trusted Linux,\n TU = HP Tru64 UNIX,\n UX = HP-UX,\n VV = HP Virtual Vault\n\n\nSystem management and security procedures must be reviewed\nfrequently to maintain system integrity. HP is continually\nreviewing and enhancing the security features of software products\nto provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to\nbring to the attention of users of the affected HP products the\nimportant security information contained in this Bulletin. HP\nrecommends that all users determine the applicability of this\ninformation to their individual situations and take appropriate\naction. HP does not warrant that this information is necessarily\naccurate or complete for all user situations and, consequently, HP\nwill not be responsible for any damages resulting from user\u0027s use\nor disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either\nexpress or implied, including the warranties of merchantability\nand fitness for a particular purpose, title and non-infringement.\"\n\n\n(c)Copyright 2006 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or\neditorial errors or omissions contained herein. The information\nprovided is provided \"as is\" without warranty of any kind. To the\nextent permitted by law, neither HP nor its affiliates,\nsubcontractors or suppliers will be liable for incidental, special\nor consequential damages including downtime cost; lost profits;\ndamages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. \nThe information in this document is subject to change without\nnotice. Hewlett-Packard Company and the names of Hewlett-Packard\nproducts referenced herein are trademarks of Hewlett-Packard\nCompany in the United States and other countries. Other product\nand company names mentioned herein may be trademarks of their\nrespective owners", "sources": [ { "db": "NVD", "id": "CVE-2004-0886" }, { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "BID", "id": "11406" }, { "db": "VULHUB", "id": "VHN-9316" }, { "db": "PACKETSTORM", "id": "39271" }, { "db": "PACKETSTORM", "id": "34737" }, { "db": "PACKETSTORM", "id": "46611" } ], "trust": 8.01 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "15227", "trust": 4.8 }, { "db": "NVD", "id": "CVE-2004-0886", "trust": 4.5 }, { "db": "SECTRACK", "id": "1011674", "trust": 3.5 }, { "db": "SECUNIA", "id": "12818", "trust": 3.5 }, { "db": "CERT/CC", "id": "VU#687568", "trust": 3.5 }, { "db": "SECTRACK", "id": "1012651", "trust": 2.4 }, { "db": "BID", "id": "11406", "trust": 2.2 }, { "db": "OSVDB", "id": "10751", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#354486", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#258390", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#356070", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#539110", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#706838", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#331694", "trust": 0.9 }, { "db": "OSVDB", "id": "16084", "trust": 0.8 }, { "db": "BID", "id": "13502", "trust": 0.8 }, { "db": "SECUNIA", "id": "13607", "trust": 0.8 }, { "db": "OSVDB", "id": "16085", "trust": 0.8 }, { "db": "SECTRACK", "id": "1013887", "trust": 0.8 }, { "db": "OSVDB", "id": "16075", "trust": 0.8 }, { "db": "XF", "id": "20376", "trust": 0.8 }, { "db": "XF", "id": "17715", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000445", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200501-308", "trust": 0.7 }, { "db": "BID", "id": "11501", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2004:039", "trust": 0.6 }, { "db": "XF", "id": "17819", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200410-30", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200410-20", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2004:113", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#537878", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#882750", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-9316", "trust": 0.1 }, { "db": "CERT/CC", "id": "VU#125598", "trust": 0.1 }, { "db": "CERT/CC", "id": "VU#582934", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "39271", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "34737", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46611", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "VULHUB", "id": "VHN-9316" }, { "db": "BID", "id": "11406" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "PACKETSTORM", "id": "39271" }, { "db": "PACKETSTORM", "id": "34737" }, { "db": "PACKETSTORM", "id": "46611" }, { "db": "CNNVD", "id": "CNNVD-200501-308" }, { "db": "NVD", "id": "CVE-2004-0886" } ] }, "id": "VAR-200501-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9316" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:36:04.792000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "libtiff", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/libtiff.html" }, { "title": "AXSA-2005-62:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=184" }, { "title": "RHSA-2005:021", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-021.html" }, { "title": "RHSA-2005:354", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-354.html" }, { "title": "RHSA-2004:577", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2004-577.html" }, { "title": "101677", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "title": "101677", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-3" }, { "title": "TLSA-2005-4", "trust": 0.8, "url": "http://www.turbolinux.com/security/2005/TLSA-2005-4.txt" }, { "title": "RHSA-2005:021", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-021J.html" }, { "title": "RHSA-2005:354", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-354J.html" }, { "title": "RHSA-2004:577", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-577J.html" }, { "title": "TLSA-2005-4", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2005/TLSA-2005-4j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000445" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0886" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.8, "url": "http://secunia.com/advisories/15227/" }, { "trust": 4.0, "url": "http://docs.info.apple.com/article.html?artnum=301528" }, { "trust": 2.7, "url": "http://www.ciac.org/ciac/bulletins/p-015.shtml" }, { "trust": 2.4, "url": "http://securitytracker.com/alerts/2004/dec/1012651.html" }, { "trust": 2.4, "url": "http://www.idefense.com/application/poi/display?id=173\u0026type=vulnerabilities" }, { "trust": 2.4, "url": "http://secunia.com/advisories/12818/" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/11406" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/687568" }, { "trust": 1.9, "url": "http://securitytracker.com/id?1011674" }, { "trust": 1.6, "url": "http://securitytracker.com/alerts/2004/oct/1011674.html" }, { "trust": 1.6, "url": "http://seclists.org/lists/bugtraq/2004/oct/0135.html" }, { "trust": 1.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0886" }, { "trust": 1.6, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=10751" }, { "trust": 1.4, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1" }, { "trust": 1.1, "url": "http://www.kde.org/info/security/advisory-20041209-2.txt" }, { "trust": 1.1, "url": "http://www.debian.org/security/2004/dsa-567" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:109" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:052" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a100116" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9907" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2004-577.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2005-021.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2005-354.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/12818" }, { "trust": 1.1, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1" }, { "trust": 1.1, "url": "http://www.novell.com/linux/security/advisories/2004_38_libtiff.html" }, { "trust": 1.1, "url": "http://www.trustix.org/errata/2004/0054/" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17715" }, { "trust": 1.0, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000888" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=109779465621929\u0026w=2" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=239" }, { "trust": 0.8, "url": "http://www.digitalmunition.com/dma%5b2005-0502a%5d.txt" }, { "trust": 0.8, "url": "http://remahl.se/david/vuln/011/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13502/" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=16084" }, { "trust": 0.8, "url": "http://secunia.com/advisories/13607/" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=240\u0026type=vulnerabilities" }, { "trust": 0.8, "url": "http://www.securityfocus.org/bid/13488" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/may/1013887.html" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=16085" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/20376" }, { "trust": 0.8, "url": "http://www.apple.com/server/macosx/" }, { "trust": 0.8, "url": "http://www.osvdb.org/16075" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0886" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17715" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23687568" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0886" }, { "trust": 0.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/17819" }, { "trust": 0.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/11501" }, { "trust": 0.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:113" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=109880927526773\u0026w=2" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57769-1" }, { "trust": 0.3, "url": "http://www.libtiff.org/" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-577.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-021.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-354.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-002_rhsa-2004-577.pdf" }, { "trust": 0.3, "url": "/archive/1/378421" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026amp;anuncio=000888" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=109779465621929\u0026amp;w=2" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/125598\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=301528\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/539110\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/537878\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/356070\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/331694\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/882750\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/354486\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/706838\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/258390\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/582934\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_hppa.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mipsel.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0803" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-6woody1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0804" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_ia64.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0886" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_m68k.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-6woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-6woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-6woody1_m68k.deb" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026" }, { "trust": 0.1, "url": "http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/537878" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://itrc.hp.com" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/882750" } ], "sources": [ { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "VULHUB", "id": "VHN-9316" }, { "db": "BID", "id": "11406" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "PACKETSTORM", "id": "39271" }, { "db": "PACKETSTORM", "id": "34737" }, { "db": "PACKETSTORM", "id": "46611" }, { "db": "CNNVD", "id": "CNNVD-200501-308" }, { "db": "NVD", "id": "CVE-2004-0886" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#354486" }, { "db": "CERT/CC", "id": "VU#258390" }, { "db": "CERT/CC", "id": "VU#356070" }, { "db": "CERT/CC", "id": "VU#539110" }, { "db": "CERT/CC", "id": "VU#706838" }, { "db": "CERT/CC", "id": "VU#331694" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" }, { "db": "VULHUB", "id": "VHN-9316" }, { "db": "BID", "id": "11406" }, { "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "db": "PACKETSTORM", "id": "39271" }, { "db": "PACKETSTORM", "id": "34737" }, { "db": "PACKETSTORM", "id": "46611" }, { "db": "CNNVD", "id": "CNNVD-200501-308" }, { "db": "NVD", "id": "CVE-2004-0886" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-05-16T00:00:00", "db": "CERT/CC", "id": "VU#354486" }, { "date": "2005-05-09T00:00:00", "db": "CERT/CC", "id": "VU#258390" }, { "date": "2005-05-06T00:00:00", "db": "CERT/CC", "id": "VU#356070" }, { "date": "2005-01-20T00:00:00", "db": "CERT/CC", "id": "VU#539110" }, { "date": "2005-05-16T00:00:00", "db": "CERT/CC", "id": "VU#706838" }, { "date": "2005-05-16T00:00:00", "db": "CERT/CC", "id": "VU#331694" }, { "date": "2004-12-01T00:00:00", "db": "CERT/CC", "id": "VU#687568" }, { "date": "2004-12-01T00:00:00", "db": "CERT/CC", "id": "VU#687568" }, { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9316" }, { "date": "2004-10-13T00:00:00", "db": "BID", "id": "11406" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "date": "2005-08-14T06:00:54", "db": "PACKETSTORM", "id": "39271" }, { "date": "2004-10-26T02:30:56", "db": "PACKETSTORM", "id": "34737" }, { "date": "2006-05-24T08:55:30", "db": "PACKETSTORM", "id": "46611" }, { "date": "2004-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-308" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0886" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-05-17T00:00:00", "db": "CERT/CC", "id": "VU#354486" }, { "date": "2005-05-16T00:00:00", "db": "CERT/CC", "id": "VU#258390" }, { "date": "2005-05-16T00:00:00", "db": "CERT/CC", "id": "VU#356070" }, { "date": "2005-08-23T00:00:00", "db": "CERT/CC", "id": "VU#539110" }, { "date": "2005-05-24T00:00:00", "db": "CERT/CC", "id": "VU#706838" }, { "date": "2005-05-25T00:00:00", "db": "CERT/CC", "id": "VU#331694" }, { "date": "2005-01-25T00:00:00", "db": "CERT/CC", "id": "VU#687568" }, { "date": "2005-01-25T00:00:00", "db": "CERT/CC", "id": "VU#687568" }, { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-9316" }, { "date": "2009-05-05T15:46:00", "db": "BID", "id": "11406" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000445" }, { "date": "2009-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-308" }, { "date": "2017-10-11T01:29:36.420000", "db": "NVD", "id": "CVE-2004-0886" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "39271" }, { "db": "PACKETSTORM", "id": "46611" }, { "db": "CNNVD", "id": "CNNVD-200501-308" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LibTIFF contains multiple integer overflows", "sources": [ { "db": "CERT/CC", "id": "VU#687568" }, { "db": "CERT/CC", "id": "VU#687568" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-308" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.