Lucene search

K
ubuntuUbuntuUSN-236-1
HistoryJan 06, 2006 - 12:00 a.m.

xpdf vulnerabilities

2006-01-0600:00:00
ubuntu.com
38

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9 High

AI Score

Confidence

High

0.036 Low

EPSS

Percentile

91.8%

Releases

  • Ubuntu 5.10
  • Ubuntu 5.04
  • Ubuntu 4.10

Details

Chris Evans discovered several integer overflows in the XPDF code,
which is present in xpdf, the Poppler library, and tetex-bin. By
tricking an user into opening a specially crafted PDF file, an
attacker could exploit this to execute arbitrary code with the
privileges of the application that processes the document.

The CUPS printing system also uses XPDF code to convert PDF files to
PostScript. By attempting to print such a crafted PDF file, a remote
attacker could execute arbitrary code with the privileges of the
printer server (user ‘cupsys’).

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9 High

AI Score

Confidence

High

0.036 Low

EPSS

Percentile

91.8%