CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
44.0%
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
Vendor | Product | Version | CPE |
---|---|---|---|
netpbm | netpbm | 9.20 | cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:* |
netpbm | netpbm | 9.21 | cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:* |
netpbm | netpbm | 9.22 | cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:* |
netpbm | netpbm | 9.23 | cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:* |
netpbm | netpbm | 9.24 | cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:* |
netpbm | netpbm | 9.25 | cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:* |
netpbm | netpbm | 10.0 | cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:* |
secunia.com/advisories/17544
secunia.com/advisories/17671
secunia.com/advisories/17679
secunia.com/advisories/17828
secunia.com/advisories/18186
www.debian.org/security/2005/dsa-904
www.mandriva.com/security/advisories?name=MDKSA-2005:217
www.novell.com/linux/security/advisories/2005_28_sr.html
www.redhat.com/support/errata/RHSA-2005-843.html
www.securityfocus.com/bid/15514
www.vupen.com/english/advisories/2005/2418
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165
usn.ubuntu.com/218-1/