Improper Input Validation Affecting xpdf package, versions <3.00-11


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
4.48% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-XPDF-524842
  • published10 Jan 2005
  • disclosed10 Jan 2005

Introduced: 10 Jan 2005

CVE-2004-1125  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:11 xpdf to version 3.00-11 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xpdf package and not the xpdf package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.

References

CVSS Scores

version 3.1