Netpbm: Buffer overflow in pnmtopng
1.
Gentoo Linux Security Advisory
Version Information
Advisory Reference |
GLSA 200510-18 / Netpbm |
Release Date |
October 20, 2005 |
Latest Revision |
May 28, 2009: 06 |
Impact |
normal |
Exploitable |
remote |
Package |
Vulnerable versions |
Unaffected versions |
Architecture(s) |
media-libs/netpbm |
<
10.29 |
>=
10.29,
revision >=
10.26.32,
revision >=
10.26.33,
revision >=
10.26.42,
revision >=
10.26.43,
revision >=
10.26.44,
revision >=
10.26.48,
revision >=
10.26.49,
revision >=
10.26.52,
revision >=
10.26.53,
revision >=
10.26.59,
revision >=
10.26.61 |
All supported architectures
|
Related bugreports:
#109705
Synopsis
The pnmtopng utility, part of the Netpbm tools, contains a vulnerability
which can potentially result in the execution of arbitrary code.
2.
Impact Information
Background
Netpbm is a package of 220 graphics programs and a programming library,
including pnmtopng, a tool to convert PNM image files to the PNG
format.
Description
RedHat reported that pnmtopng is vulnerable to a buffer overflow.
Impact
An attacker could craft a malicious PNM file and entice a user to run
pnmtopng on it, potentially resulting in the execution of arbitrary
code with the permissions of the user running pnmtopng.
3.
Resolution Information
Workaround
There is no known workaround at this time.
Resolution
All Netpbm users should upgrade to the latest version:
Code Listing 3.1: Resolution |
# emerge --sync
# emerge --ask --oneshot --verbose media-libs/netpbm
|
4.
References
|