CVE-2004-1125
Summary
| CVE | CVE-2004-1125 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-01-10 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| bugzilla.fedora.us/show_bug.cgi | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.fedora.us | |
| iDEFENSE | af854a3a-2127-422b-91ae-364da2661108 | www.idefense.com | |
| XPDF DoImage Remote Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| Gentoo Linux Documentation -- KPdf, KOffice: More vulnerabilities in included Xpdf | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch | af854a3a-2127-422b-91ae-364da2661108 | ftp.foolabs.com | |
| Secunia - Advisories - SCO OpenServer update for xpdf | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| www.kde.org/info/security/advisory-20041223-1.txt | af854a3a-2127-422b-91ae-364da2661108 | www.kde.org | |
| USN-50-1: CUPS vulnerabilities | Ubuntu security notices | af854a3a-2127-422b-91ae-364da2661108 | usn.ubuntu.com | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| SecurityTracker.com Archives - Xpdf Buffer Overflow in doImage() Lets Remote Users Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| [Full-Disclosure] [USN-48-1] xpdf, tetex-bin vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| bugzilla.fedora.us/show_bug.cgi | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.fedora.us | |
| Gentoo Linux Documentation -- pdftohtml: Vulnerabilities in included Xpdf | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| Gentoo Linux Documentation -- CUPS: Multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| 'KDE Security Advisory: kpdf Buffer Overflow' thread - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt | af854a3a-2127-422b-91ae-364da2661108 | ftp.sco.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.