CVE-2005-0206
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/04/2005
Last modified:
03/04/2025
Description
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A041
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A042
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A043
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A044
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A052
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A056
- http://www.redhat.com/support/errata/RHSA-2005-034.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.redhat.com/support/errata/RHSA-2005-057.html
- http://www.redhat.com/support/errata/RHSA-2005-132.html
- http://www.redhat.com/support/errata/RHSA-2005-213.html
- http://www.securityfocus.com/bid/11501
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A041
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A042
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A043
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A044
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A052
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A056
- http://www.redhat.com/support/errata/RHSA-2005-034.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.redhat.com/support/errata/RHSA-2005-057.html
- http://www.redhat.com/support/errata/RHSA-2005-132.html
- http://www.redhat.com/support/errata/RHSA-2005-213.html
- http://www.securityfocus.com/bid/11501
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107



