Vulnerability Details CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.065
EPSS Ranking 90.6%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2005-0206
-
cpe:2.3:a:ascii:ptex:3.1.4
-
cpe:2.3:a:cstex:cstetex:2.0.2
-
cpe:2.3:a:easy_software_products:cups:1.0.4
-
cpe:2.3:a:easy_software_products:cups:1.0.4_8
-
cpe:2.3:a:easy_software_products:cups:1.1.1
-
cpe:2.3:a:easy_software_products:cups:1.1.10
-
cpe:2.3:a:easy_software_products:cups:1.1.12
-
cpe:2.3:a:easy_software_products:cups:1.1.13
-
cpe:2.3:a:easy_software_products:cups:1.1.14
-
cpe:2.3:a:easy_software_products:cups:1.1.15
-
cpe:2.3:a:easy_software_products:cups:1.1.16
-
cpe:2.3:a:easy_software_products:cups:1.1.17
-
cpe:2.3:a:easy_software_products:cups:1.1.18
-
cpe:2.3:a:easy_software_products:cups:1.1.19
-
cpe:2.3:a:easy_software_products:cups:1.1.19_rc5
-
cpe:2.3:a:easy_software_products:cups:1.1.20
-
cpe:2.3:a:easy_software_products:cups:1.1.4
-
cpe:2.3:a:easy_software_products:cups:1.1.4_2
-
cpe:2.3:a:easy_software_products:cups:1.1.4_3
-
cpe:2.3:a:easy_software_products:cups:1.1.4_5
-
cpe:2.3:a:easy_software_products:cups:1.1.6
-
cpe:2.3:a:easy_software_products:cups:1.1.7
-
cpe:2.3:a:gnome:gpdf:0.110
-
cpe:2.3:a:gnome:gpdf:0.112
-
cpe:2.3:a:gnome:gpdf:0.131
-
cpe:2.3:a:kde:koffice:1.3
-
cpe:2.3:a:kde:koffice:1.3.1
-
cpe:2.3:a:kde:koffice:1.3.2
-
cpe:2.3:a:kde:koffice:1.3.3
-
cpe:2.3:a:kde:koffice:1.3_beta1
-
cpe:2.3:a:kde:koffice:1.3_beta2
-
cpe:2.3:a:kde:koffice:1.3_beta3
-
-
cpe:2.3:a:pdftohtml:pdftohtml:0.32a
-
cpe:2.3:a:pdftohtml:pdftohtml:0.32b
-
cpe:2.3:a:pdftohtml:pdftohtml:0.33
-
cpe:2.3:a:pdftohtml:pdftohtml:0.33a
-
cpe:2.3:a:pdftohtml:pdftohtml:0.34
-
cpe:2.3:a:pdftohtml:pdftohtml:0.35
-
cpe:2.3:a:pdftohtml:pdftohtml:0.36
-
cpe:2.3:a:sgi:propack:3.0
-
cpe:2.3:a:tetex:tetex:1.0.6
-
cpe:2.3:a:tetex:tetex:1.0.7
-
cpe:2.3:a:tetex:tetex:2.0
-
cpe:2.3:a:tetex:tetex:2.0.1
-
cpe:2.3:a:tetex:tetex:2.0.2
-
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:o:debian:debian_linux:3.0
-
-
cpe:2.3:o:gentoo:linux:1.2
-
cpe:2.3:o:gentoo:linux:1.4
-
cpe:2.3:o:gentoo:linux:2.1.30
-
cpe:2.3:o:gentoo:linux:2.2.28
-
cpe:2.3:o:gentoo:linux:2.3.30
-
-
-
-
-
-
-
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
-
cpe:2.3:o:redhat:enterprise_linux:2.1
-
cpe:2.3:o:redhat:enterprise_linux:3.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
-
cpe:2.3:o:redhat:fedora_core:core_1.0
-
cpe:2.3:o:redhat:fedora_core:core_2.0
-
cpe:2.3:o:redhat:fedora_core:core_3.0
-
cpe:2.3:o:redhat:linux:9.0
-
cpe:2.3:o:redhat:linux_advanced_workstation:2.1
-
cpe:2.3:o:sgi:advanced_linux_environment:3.0
-
cpe:2.3:o:suse:suse_linux:1.0
-
cpe:2.3:o:suse:suse_linux:2.0
-
cpe:2.3:o:suse:suse_linux:3.0
-
cpe:2.3:o:suse:suse_linux:4.0
-
cpe:2.3:o:suse:suse_linux:4.2
-
cpe:2.3:o:suse:suse_linux:4.3
-
cpe:2.3:o:suse:suse_linux:4.4
-
cpe:2.3:o:suse:suse_linux:4.4.1
-
cpe:2.3:o:suse:suse_linux:5.0
-
cpe:2.3:o:suse:suse_linux:5.1
-
cpe:2.3:o:suse:suse_linux:5.2
-
cpe:2.3:o:suse:suse_linux:5.3
-
cpe:2.3:o:suse:suse_linux:6.0
-
cpe:2.3:o:suse:suse_linux:6.1
-
cpe:2.3:o:suse:suse_linux:6.2
-
cpe:2.3:o:suse:suse_linux:6.3
-
cpe:2.3:o:suse:suse_linux:6.4
-
cpe:2.3:o:suse:suse_linux:7.0
-
cpe:2.3:o:suse:suse_linux:7.1
-
cpe:2.3:o:suse:suse_linux:7.2
-
cpe:2.3:o:suse:suse_linux:7.3
-
cpe:2.3:o:suse:suse_linux:8.0
-
cpe:2.3:o:suse:suse_linux:8.1
-
cpe:2.3:o:suse:suse_linux:8.2
-
cpe:2.3:o:suse:suse_linux:9.0
-
cpe:2.3:o:suse:suse_linux:9.1
-
cpe:2.3:o:suse:suse_linux:9.2
-
cpe:2.3:o:ubuntu:ubuntu_linux:4.1