Description
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- partial
- Integrity
- partial
- Availability
- partial
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- ASCII
- Published
- 4/27/2005
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
ascii : ptexcstex : cstetexeasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupsgnome : gpdfgnome : gpdfgnome : gpdfkde : kofficekde : kofficekde : kofficekde : kofficekde : kofficekde : kofficekde : kofficekde : kpdfpdftohtml : pdftohtmlpdftohtml : pdftohtmlpdftohtml : pdftohtmlpdftohtml : pdftohtmlpdftohtml : pdftohtmlpdftohtml : pdftohtmlpdftohtml : pdftohtmlsgi : propacktetex : tetextetex : tetextetex : tetextetex : tetextetex : tetexxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfxpdf : xpdfsgi : advanced_linux_environmentdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxgentoo : linuxkde : kdekde : kdekde : kdekde : kdekde : kdekde : kdemandrakesoft : mandrake_linux_corporate_servermandrakesoft : mandrake_linux_corporate_serverredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linux_desktopredhat : fedora_coreredhat : fedora_coreredhat : fedora_coreredhat : linuxredhat : linux_advanced_workstationredhat : linux_advanced_workstationsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxubuntu : ubuntu_linuxubuntu : ubuntu_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.