7.5
CVSSv2

CVE-2005-2471

Published: 05/08/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted malicious users to execute arbitrary commands.

Vulnerable Product Search on Vulmon Subscribe to Product

netpbm netpbm 2.10.0.8

Vendor Advisories

Synopsis netpbm security update Type/Severity Security Advisory: Low Topic Updated netpbm packages that fix a security issue are now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description The netpbm package contains a library of ...
Max Vozeler discovered that the the “pstopnm” conversion tool did not use the -dSAFER option when calling ghostscript This option prohibits file operations and calling commands within PostScript code This flaw could be exploited by an attacker to execute arbitrary code if he tricked an user (or an automatic server) into processing a specially ...