First published: Tue Feb 15 2005(Updated: )
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ascii ptex | =3.1.4 | |
cstex cstetex | =2.0.2 | |
CUPS (Common UNIX Printing System) | =1.0.4 | |
CUPS (Common UNIX Printing System) | =1.0.4_8 | |
CUPS (Common UNIX Printing System) | =1.1.1 | |
CUPS (Common UNIX Printing System) | =1.1.4 | |
CUPS (Common UNIX Printing System) | =1.1.4_2 | |
CUPS (Common UNIX Printing System) | =1.1.4_3 | |
CUPS (Common UNIX Printing System) | =1.1.4_5 | |
CUPS (Common UNIX Printing System) | =1.1.6 | |
CUPS (Common UNIX Printing System) | =1.1.7 | |
CUPS (Common UNIX Printing System) | =1.1.10 | |
CUPS (Common UNIX Printing System) | =1.1.12 | |
CUPS (Common UNIX Printing System) | =1.1.13 | |
CUPS (Common UNIX Printing System) | =1.1.14 | |
CUPS (Common UNIX Printing System) | =1.1.15 | |
CUPS (Common UNIX Printing System) | =1.1.16 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.18 | |
CUPS (Common UNIX Printing System) | =1.1.19 | |
CUPS (Common UNIX Printing System) | =1.1.19_rc5 | |
CUPS (Common UNIX Printing System) | =1.1.20 | |
GNOME GPDF | =0.110 | |
GNOME GPDF | =0.112 | |
GNOME GPDF | =0.131 | |
KDE KOffice | =1.3 | |
KDE KOffice | =1.3.1 | |
KDE KOffice | =1.3.2 | |
KDE KOffice | =1.3.3 | |
KDE KOffice | =1.3_beta1 | |
KDE KOffice | =1.3_beta2 | |
KDE KOffice | =1.3_beta3 | |
KDE KPDF | =3.2 | |
pdftohtml | =0.32a | |
pdftohtml | =0.32b | |
pdftohtml | =0.33 | |
pdftohtml | =0.33a | |
pdftohtml | =0.34 | |
pdftohtml | =0.35 | |
pdftohtml | =0.36 | |
SGI ProPack | =3.0 | |
teTeX | =1.0.6 | |
teTeX | =1.0.7 | |
teTeX | =2.0 | |
teTeX | =2.0.1 | |
teTeX | =2.0.2 | |
Xpdf | =0.90 | |
Xpdf | =0.91 | |
Xpdf | =0.92 | |
Xpdf | =0.93 | |
Xpdf | =1.0 | |
Xpdf | =1.0a | |
Xpdf | =1.1 | |
Xpdf | =2.0 | |
Xpdf | =2.1 | |
Xpdf | =2.3 | |
Xpdf | =3.0 | |
SGI Advanced Linux Environment | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Debian | =3.0 | |
Gentoo Linux | ||
KDE Kde Beta 3 | =3.2 | |
KDE Kde Beta 3 | =3.2.1 | |
KDE Kde Beta 3 | =3.2.2 | |
KDE Kde Beta 3 | =3.2.3 | |
KDE Kde Beta 3 | =3.3 | |
KDE Kde Beta 3 | =3.3.1 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Fedora Core | =core_1.0 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 | |
Red Hat Linux | =9.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
SUSE Linux | =1.0 | |
SUSE Linux | =2.0 | |
SUSE Linux | =3.0 | |
SUSE Linux | =4.0 | |
SUSE Linux | =4.2 | |
SUSE Linux | =4.3 | |
SUSE Linux | =4.4 | |
SUSE Linux | =4.4.1 | |
SUSE Linux | =5.0 | |
SUSE Linux | =5.1 | |
SUSE Linux | =5.2 | |
SUSE Linux | =5.3 | |
SUSE Linux | =6.0 | |
SUSE Linux | =6.1 | |
SUSE Linux | =6.1-alpha | |
SUSE Linux | =6.2 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3-alpha | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4-alpha | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0-alpha | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1-alpha | |
SUSE Linux | =7.2 | |
SUSE Linux | =7.2 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =8.0 | |
SUSE Linux | =8.0 | |
SUSE Linux | =8.1 | |
SUSE Linux | =8.2 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
Ubuntu Linux | =4.1 | |
Ubuntu Linux | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0206 is considered to have moderate severity as it relates to incomplete patching of integer overflow vulnerabilities.
To fix CVE-2005-0206, you should apply the latest security updates for Xpdf and ensure that all relevant patches are fully integrated for your Linux distribution.
Affected versions include Xpdf 1.0, 2.0, and 3.0, particularly on specific 64-bit Linux distributions like Red Hat.
CVE-2005-0206 primarily impacts systems running 64-bit architectures of Xpdf on certain Linux distributions such as Red Hat and SUSE.
While CVE-2005-0206 relates to vulnerabilities discovered years ago, it remains relevant for legacy systems still using affected software versions.