Description
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
Product(s):
- Easy Software Products CUPS 1.0.4
- Easy Software Products CUPS 1.0.4_8
- Easy Software Products CUPS 1.1.10
- Easy Software Products CUPS 1.1.12
- Easy Software Products CUPS 1.1.13
- Easy Software Products CUPS 1.1.14
- Easy Software Products CUPS 1.1.15
- Easy Software Products CUPS 1.1.16
- Easy Software Products CUPS 1.1.17
- Easy Software Products CUPS 1.1.18
- Easy Software Products CUPS 1.1.19
- Easy Software Products CUPS 1.1.19 RC5
- Easy Software Products CUPS 1.1.1
- Easy Software Products CUPS 1.1.20
- Easy Software Products CUPS 1.1.4
- Easy Software Products CUPS 1.1.4_2
- Easy Software Products CUPS 1.1.4_3
- Easy Software Products CUPS 1.1.4_5
- Easy Software Products CUPS 1.1.6
- Easy Software Products CUPS 1.1.7
- GNOME gpdf 0.112
- GNOME gpdf 0.131
- KDE KOffice 1.3.1
- KDE KOffice 1.3.2
- KDE KOffice 1.3.3
- KDE KOffice 1.3
- KDE KOffice 1.3 Beta1
- KDE KOffice 1.3 Beta2
- KDE KOffice 1.3 Beta3
- KDE KOffice 1.3 Beta 1
- KDE KOffice 1.3 Beta 2
- KDE KOffice 1.3 Beta 3
- KDE KPDF 3.2
- Pdftohtml Pdftohtml 0.32a
- Pdftohtml Pdftohtml 0.32b
- Pdftohtml Pdftohtml 0.33
- Pdftohtml Pdftohtml 0.33a
- Pdftohtml Pdftohtml 0.34
- Pdftohtml 0.35
- Pdftohtml 0.36
- TeX TeX 1.0.7
- TeX TeX 2.0.1
- teTeX 2.0.2
- teTeX 2.0
- Xpdf 0.90
- Xpdf 0.91
- Xpdf 0.92
- Xpdf 0.93
- Xpdf 1.0
- Xpdf 1.0a
- Xpdf 1.1
- Xpdf 2.0
- Xpdf 2.1
- Xpdf 2.3
- Xpdf 3.0
- Debian Debian Linux 3.0
- Debian Linux 3.0 on Alpha
- Debian Linux 3.0 on ARM
- Debian Linux 3.0 on HPPA
- Debian Linux 3.0 on IA-32
- Debian Linux 3.0 on IA-64
- Debian Linux 3.0 on M68k
- Debian Linux 3.0 on MIPS
- Debian Linux 3.0 on MIPSEL
- Debian Linux 3.0 on PPC
- Debian Linux 3.0 on S/390
- Debian Linux 3.0 on SPARC
- Gentoo Linux
- Gentoo Linux 1.2
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Gentoo Linux 2.1.30 r9
- Gentoo Linux 2.2.28 r7
- Gentoo Linux 2.3.30 r2
- KDE 3.2.1
- KDE 3.2.2
- KDE KDE 3.2.3
- KDE 3.2
- KDE 3.3.1
- KDE KDE 3.3
- KDE 3.3 -
- KDE 3.3 Beta 1
- KDE 3.3 Beta 2
- Red Hat Enterprise Linux 2.1 Advanced Server
- Red Hat Enterprise Linux 2.1 Advanced Server IA64
- Red Hat Enterprise Linux 2.1 Enterprise Server
- Red Hat Enterprise Linux 2.1 Enterprise Server IA64
- Red Hat Enterprise Linux 2.1 Workstation
- Red Hat Enterprise Linux 2.1 Workstation IA64
- Red Hat Enterprise Linux 3.0 Advanced Server Edition
- Red Hat Enterprise Linux 3.0 Enterprise Server Edition
- Red Hat Enterprise Linux 3.0 Workstation Server Edition
- Red Hat Desktop 3.0
- Red Hat Fedora Core Core 2.0
- Red Hat Linux Advanced Workstation 2.1 on IA64
- Red Hat Linux Advanced Workstation 2.1 on Itanium Processor
- +11 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0888, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0888 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.