CVE-2005-0206 (CNNVD-200504-121)

HIGH
中文标题:
Xpdf 补丁整形溢出漏洞
英文标题:
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for...
CVSS分数: 7.5
发布时间: 2005-02-15 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Xpdf是开放源代码查看PDF文件程序。 Xpdf 2.0和3.0的整形溢出的补丁与一些64位的LINUX发布版不兼容(如Red hat),这可能导致Xpdf的用户存整形溢出漏洞。

英文描述:

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ascii ptex 3.1.4 - - cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:*
cstex cstetex 2.0.2 - - cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:*
easy_software_products cups 1.0.4 - - cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
easy_software_products cups 1.0.4_8 - - cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
easy_software_products cups 1.1.1 - - cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
easy_software_products cups 1.1.4 - - cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_2 - - cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_3 - - cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_5 - - cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
easy_software_products cups 1.1.6 - - cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
easy_software_products cups 1.1.7 - - cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
easy_software_products cups 1.1.10 - - cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
easy_software_products cups 1.1.12 - - cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
easy_software_products cups 1.1.13 - - cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
easy_software_products cups 1.1.14 - - cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
easy_software_products cups 1.1.15 - - cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
easy_software_products cups 1.1.16 - - cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
easy_software_products cups 1.1.17 - - cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
easy_software_products cups 1.1.18 - - cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
easy_software_products cups 1.1.19 - - cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
easy_software_products cups 1.1.19_rc5 - - cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
easy_software_products cups 1.1.20 - - cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
gnome gpdf 0.110 - - cpe:2.3:a:gnome:gpdf:0.110:*:*:*:*:*:*:*
gnome gpdf 0.112 - - cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
gnome gpdf 0.131 - - cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
kde koffice 1.3 - - cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
kde koffice 1.3.1 - - cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
kde koffice 1.3.2 - - cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
kde koffice 1.3.3 - - cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
kde koffice 1.3_beta1 - - cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
kde koffice 1.3_beta2 - - cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
kde koffice 1.3_beta3 - - cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
kde kpdf 3.2 - - cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.32a - - cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.32b - - cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.33 - - cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.33a - - cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.34 - - cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.35 - - cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.36 - - cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
sgi propack 3.0 - - cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
tetex tetex 1.0.6 - - cpe:2.3:a:tetex:tetex:1.0.6:*:*:*:*:*:*:*
tetex tetex 1.0.7 - - cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
tetex tetex 2.0 - - cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
tetex tetex 2.0.1 - - cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
tetex tetex 2.0.2 - - cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
xpdf xpdf 0.90 - - cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
xpdf xpdf 0.91 - - cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
xpdf xpdf 0.92 - - cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
xpdf xpdf 0.93 - - cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
xpdf xpdf 1.0 - - cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
xpdf xpdf 1.0a - - cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
xpdf xpdf 1.1 - - cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
xpdf xpdf 2.0 - - cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
xpdf xpdf 2.1 - - cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
xpdf xpdf 2.3 - - cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
xpdf xpdf 3.0 - - cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
sgi advanced_linux_environment 3.0 - - cpe:2.3:o:sgi:advanced_linux_environment:3.0:*:*:*:*:*:*:*
debian debian_linux 3.0 - - cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
gentoo linux * - - cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
kde kde 3.2 - - cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
kde kde 3.2.1 - - cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
kde kde 3.2.2 - - cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
kde kde 3.2.3 - - cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
kde kde 3.3 - - cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
kde kde 3.3.1 - - cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
mandrakesoft mandrake_linux_corporate_server 3.0 - - cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
redhat enterprise_linux 2.1 - - cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
redhat enterprise_linux 3.0 - - cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
redhat enterprise_linux_desktop 3.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
redhat fedora_core core_1.0 - - cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
redhat fedora_core core_2.0 - - cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
redhat fedora_core core_3.0 - - cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
redhat linux 9.0 - - cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
redhat linux_advanced_workstation 2.1 - - cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
suse suse_linux 1.0 - - cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
suse suse_linux 2.0 - - cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
suse suse_linux 3.0 - - cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
suse suse_linux 4.0 - - cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
suse suse_linux 4.2 - - cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
suse suse_linux 4.3 - - cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
suse suse_linux 4.4 - - cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
suse suse_linux 4.4.1 - - cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
suse suse_linux 5.0 - - cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
suse suse_linux 5.1 - - cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
suse suse_linux 5.2 - - cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
suse suse_linux 5.3 - - cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
suse suse_linux 6.0 - - cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
suse suse_linux 6.1 - - cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
suse suse_linux 6.2 - - cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
suse suse_linux 6.3 - - cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
suse suse_linux 6.4 - - cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
suse suse_linux 7.0 - - cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
suse suse_linux 7.1 - - cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
suse suse_linux 7.2 - - cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
suse suse_linux 7.3 - - cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
suse suse_linux 8.0 - - cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
suse suse_linux 8.1 - - cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
suse suse_linux 8.2 - - cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
suse suse_linux 9.0 - - cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
suse suse_linux 9.1 - - cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
suse suse_linux 9.2 - - cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
ubuntu ubuntu_linux 4.1 - - cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
oval:org.mitre.oval:def:11107 vdb-entry
cve.org
访问
MDKSA-2005:041 vendor-advisory
cve.org
访问
11501 vdb-entry
cve.org
访问
RHSA-2005:034 vendor-advisory
cve.org
访问
MDKSA-2005:056 vendor-advisory
cve.org
访问
MDKSA-2005:043 vendor-advisory
cve.org
访问
RHSA-2005:213 vendor-advisory
cve.org
访问
MDKSA-2005:044 vendor-advisory
cve.org
访问
RHSA-2005:053 vendor-advisory
cve.org
访问
xpdf-pdf-bo(17818) vdb-entry
cve.org
访问
MDKSA-2005:052 vendor-advisory
cve.org
访问
RHSA-2005:132 vendor-advisory
cve.org
访问
MDKSA-2005:042 vendor-advisory
cve.org
访问
RHSA-2005:057 vendor-advisory
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-02-15 05:00:00
修改时间:
2024-08-07 21:05:25
创建时间:
2025-11-11 15:32:24
更新时间:
2025-11-11 15:48:57
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-0206 2025-11-11 15:17:32 2025-11-11 07:32:24
NVD nvd_CVE-2005-0206 2025-11-11 14:51:18 2025-11-11 07:41:10
CNNVD cnnvd_CNNVD-200504-121 2025-11-11 15:08:44 2025-11-11 07:48:57
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:57
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200504-121; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200504-121
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:10
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 103; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 103
  • data_sources: ['cve'] -> ['cve', 'nvd']