CVE-2004-0888 (CNNVD-200501-301)

CRITICAL
中文标题:
Xpdf 整数溢出漏洞
英文标题:
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, ...
CVSS分数: 10.0
发布时间: 2004-10-26 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Xpdf是开源的查看PDF文件程序。 xpdf 2.0及3.0版本存在整数溢出漏洞,这使得使用xpdf的程序包(如CUPS, gpdf,kdegraphics)均存在问题。 攻击者可利用此漏洞进行拒绝服务攻击,也可能导致执行任意代码。

英文描述:

Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
easy_software_products cups 1.0.4 - - cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
easy_software_products cups 1.0.4_8 - - cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
easy_software_products cups 1.1.1 - - cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
easy_software_products cups 1.1.4 - - cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_2 - - cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_3 - - cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
easy_software_products cups 1.1.4_5 - - cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
easy_software_products cups 1.1.6 - - cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
easy_software_products cups 1.1.7 - - cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
easy_software_products cups 1.1.10 - - cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
easy_software_products cups 1.1.12 - - cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
easy_software_products cups 1.1.13 - - cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
easy_software_products cups 1.1.14 - - cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
easy_software_products cups 1.1.15 - - cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
easy_software_products cups 1.1.16 - - cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
easy_software_products cups 1.1.17 - - cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
easy_software_products cups 1.1.18 - - cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
easy_software_products cups 1.1.19 - - cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
easy_software_products cups 1.1.19_rc5 - - cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
easy_software_products cups 1.1.20 - - cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
gnome gpdf 0.112 - - cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
gnome gpdf 0.131 - - cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
kde koffice 1.3 - - cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
kde koffice 1.3.1 - - cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
kde koffice 1.3.2 - - cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
kde koffice 1.3.3 - - cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
kde koffice 1.3_beta1 - - cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
kde koffice 1.3_beta2 - - cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
kde koffice 1.3_beta3 - - cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
kde kpdf 3.2 - - cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.32a - - cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.32b - - cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.33 - - cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.33a - - cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.34 - - cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.35 - - cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
pdftohtml pdftohtml 0.36 - - cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
tetex tetex 1.0.7 - - cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
tetex tetex 2.0 - - cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
tetex tetex 2.0.1 - - cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
tetex tetex 2.0.2 - - cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
xpdf xpdf 0.90 - - cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
xpdf xpdf 0.91 - - cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
xpdf xpdf 0.92 - - cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
xpdf xpdf 0.93 - - cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
xpdf xpdf 1.0 - - cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
xpdf xpdf 1.0a - - cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
xpdf xpdf 1.1 - - cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
xpdf xpdf 2.0 - - cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
xpdf xpdf 2.1 - - cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
xpdf xpdf 2.3 - - cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
xpdf xpdf 3.0 - - cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
debian debian_linux 3.0 - - cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
gentoo linux * - - cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
kde kde 3.2 - - cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
kde kde 3.2.1 - - cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
kde kde 3.2.2 - - cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
kde kde 3.2.3 - - cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
kde kde 3.3 - - cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
kde kde 3.3.1 - - cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
redhat enterprise_linux 2.1 - - cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
redhat enterprise_linux 3.0 - - cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
redhat enterprise_linux_desktop 3.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
redhat fedora_core core_2.0 - - cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
redhat linux_advanced_workstation 2.1 - - cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
suse suse_linux 8.0 - - cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
suse suse_linux 8.1 - - cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
suse suse_linux 8.2 - - cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
suse suse_linux 9.0 - - cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
suse suse_linux 9.1 - - cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
suse suse_linux 9.2 - - cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
ubuntu ubuntu_linux 4.1 - - cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2004:592 vendor-advisory
cve.org
访问
11501 vdb-entry
cve.org
访问
RHSA-2005:066 vendor-advisory
cve.org
访问
USN-9-1 vendor-advisory
cve.org
访问
MDKSA-2004:113 vendor-advisory
cve.org
访问
GLSA-200410-20 vendor-advisory
cve.org
访问
DSA-581 vendor-advisory
cve.org
访问
DSA-573 vendor-advisory
cve.org
访问
FLSA:2353 vendor-advisory
cve.org
访问
MDKSA-2004:116 vendor-advisory
cve.org
访问
DSA-599 vendor-advisory
cve.org
访问
xpdf-pdf-bo(17818) vdb-entry
cve.org
访问
RHSA-2005:354 vendor-advisory
cve.org
访问
RHSA-2004:543 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:9714 vdb-entry
cve.org
访问
CLA-2004:886 vendor-advisory
cve.org
访问
MDKSA-2004:114 vendor-advisory
cve.org
访问
GLSA-200410-30 vendor-advisory
cve.org
访问
MDKSA-2004:115 vendor-advisory
cve.org
访问
SUSE-SA:2004:039 vendor-advisory
cve.org
访问
FLSA:2352 vendor-advisory
cve.org
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2004-10-26 04:00:00
修改时间:
2024-08-08 00:31:47
创建时间:
2025-11-11 15:32:21
更新时间:
2025-11-11 15:48:56
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-0888 2025-11-11 15:17:29 2025-11-11 07:32:21
NVD nvd_CVE-2004-0888 2025-11-11 14:50:56 2025-11-11 07:41:08
CNNVD cnnvd_CNNVD-200501-301 2025-11-11 15:08:44 2025-11-11 07:48:56
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:56
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200501-301; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200501-301
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:08
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 72; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 72
  • data_sources: ['cve'] -> ['cve', 'nvd']