Rapid7 Vulnerability & Exploit Database

CESA-2005:793: netpbm security update

Back to Search

CESA-2005:793: netpbm security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
10/18/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated netpbm packages that fix a security issue are now available. This update has been rated as having moderate security impact by the CentOS Security Response Team.

The netpbm package contains a library of functions that support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others. A bug was found in the way netpbm converts Portable Anymap (PNM) files into Portable Network Graphics (PNG). The usage of uninitialised variables in the pnmtopng code allows an attacker to change stack contents when converting to PNG files with pnmtopng using the '-trans' option. This may allow an attacker to execute arbitrary code. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-2978 to this issue. All users of netpbm should upgrade to the updated packages, which contain a backported patch to resolve this issue.

Solution(s)

  • centos-upgrade-netpbm
  • centos-upgrade-netpbm-devel
  • centos-upgrade-netpbm-progs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;