GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Oct 20, 2005 11:49 am Post subject: [ GLSA 200510-18 ] Netpbm: Buffer overflow in pnmtopng |
|
|
Gentoo Linux Security Advisory
Title: Netpbm: Buffer overflow in pnmtopng (GLSA 200510-18)
Severity: normal
Exploitable: remote
Date: October 20, 2005
Updated: May 28, 2009
Bug(s): #109705
ID: 200510-18
Synopsis
The pnmtopng utility, part of the Netpbm tools, contains a vulnerability which can potentially result in the execution of arbitrary code.
Background
Netpbm is a package of 220 graphics programs and a programming library, including pnmtopng, a tool to convert PNM image files to the PNG format.
Affected Packages
Package: media-libs/netpbm
Vulnerable: < 10.29
Unaffected: >= 10.29
Unaffected: >= 10.26.32 < 10.26.33
Unaffected: >= 10.26.33 < 10.26.34
Unaffected: >= 10.26.42 < 10.26.43
Unaffected: >= 10.26.43 < 10.26.44
Unaffected: >= 10.26.44 < 10.26.45
Unaffected: >= 10.26.48 < 10.26.49
Unaffected: >= 10.26.49 < 10.26.50
Unaffected: >= 10.26.52 < 10.26.53
Unaffected: >= 10.26.53 < 10.26.54
Unaffected: >= 10.26.59 < 10.26.60
Unaffected: >= 10.26.61 < 10.26.62
Architectures: All supported architectures
Description
RedHat reported that pnmtopng is vulnerable to a buffer overflow.
Impact
An attacker could craft a malicious PNM file and entice a user to run pnmtopng on it, potentially resulting in the execution of arbitrary code with the permissions of the user running pnmtopng.
Workaround
There is no known workaround at this time.
Resolution
All Netpbm users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose media-libs/netpbm |
References
CAN-2005-2978
Last edited by GLSA on Fri May 29, 2009 4:17 am; edited 6 times in total |
|