9.3
CVSSv2

CVE-2004-1125

Published: 10/01/2005 Updated: 03/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.

Vulnerable Product Search on Vulmon Subscribe to Product

xpdf xpdf 3.0

easy software products cups 1.1.20

kde kde 3.2.3

kde kde 3.3.2

Vendor Advisories

A potential buffer overflow has been found in the xpdf viewer An insufficient input validation could be exploited by an attacker providing a specially crafted PDF file which, when processed by xpdf, could result in abnormal program termination or the execution of attacker supplied program code with the user’s privileges ...
Synopsis cups security update Type/Severity Security Advisory: Important Topic Updated CUPS packages that fix several security issues are now available Description The Common UNIX Printing System provides a portable printing layer forUNIX(R) operating systemsA buffer overflow was found in ...
Synopsis CUPS security update Type/Severity Security Advisory: Important Topic Updated CUPS packages that fix several security issues are now availableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description The Common UNIX Printing S ...
Synopsis tetex security update Type/Severity Security Advisory: Moderate Topic Updated tetex packages that resolve security issues are now available for RedHat Enterprise Linux 4This update has been rated as having moderate security impact by the Red HatSecurity Response Team Description ...
Synopsis xpdf security update Type/Severity Security Advisory: Important Topic An updated xpdf package that fixes several security issues is now availableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description Xpdf is an X Window Sys ...
Synopsis kdegraphics security update Type/Severity Security Advisory: Important Topic Updated kdegraphics packages that resolve security issues in kpdf are nowavailableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description The kdegr ...
Synopsis xpdf security update Type/Severity Security Advisory: Moderate Topic Updated Xpdf packages that fix several security issues are now available Description Xpdf is an X Window System based viewer for Portable Document Format (PDF)filesA buffer overflow flaw was found in the Gfx::do ...
Synopsis tetex security update Type/Severity Security Advisory: Moderate Topic Updated tetex packages that fix several integer overflows are now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description TeTeX is an implementati ...
Synopsis gpdf security update Type/Severity Security Advisory: Important Topic An updated gpdf package that fixes two security issues is now availableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description GPdf is a viewer for Portab ...
An iDEFENSE security researcher discovered a buffer overflow in xpdf, the portable document format (PDF) suite A maliciously crafted PDF file could exploit this problem, resulting in the execution of arbitrary code For the stable distribution (woody) this problem has been fixed in version 100-33 For the unstable distribution (sid) this problem ...
An iDEFENSE security researcher discovered a buffer overflow in xpdf, the Portable Document Format (PDF) suite Similar code is present in the PDF processing part of CUPS A maliciously crafted PDF file could exploit this problem, leading to the execution of arbitrary code For the stable distribution (woody) this problem has been fixed in version ...

References

CWE-20http://www.securityfocus.com/bid/12070ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patchhttp://www.kde.org/info/security/advisory-20041223-1.txthttp://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.htmlhttps://bugzilla.fedora.us/show_bug.cgi?id=2353https://bugzilla.fedora.us/show_bug.cgi?id=2352http://www.gentoo.org/security/en/glsa/glsa-200501-13.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200501-17.xmlhttp://www.redhat.com/support/errata/RHSA-2005-013.htmlhttp://www.redhat.com/support/errata/RHSA-2005-018.htmlhttp://www.redhat.com/support/errata/RHSA-2005-034.htmlhttp://www.redhat.com/support/errata/RHSA-2005-053.htmlhttp://www.redhat.com/support/errata/RHSA-2005-057.htmlhttp://www.redhat.com/support/errata/RHSA-2005-066.htmlhttp://www.redhat.com/support/errata/RHSA-2005-354.htmlhttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921http://www.gentoo.org/security/en/glsa/glsa-200412-25.xmlftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txthttp://secunia.com/advisories/17277http://www.redhat.com/support/errata/RHSA-2005-026.htmlhttp://securitytracker.com/id?1012646http://www.novell.com/linux/security/advisories/2005_01_sr.htmlhttp://www.idefense.com/application/poi/display?id=172&type=vulnerabilitieshttp://marc.info/?t=110378596500001&r=1&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/18641https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830https://usn.ubuntu.com/50-1/https://nvd.nist.govhttps://usn.ubuntu.com/50-1/