4.6
CVSSv2

CVE-2005-3632

Published: 21/11/2005 Updated: 03/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in pnmtopng in netpbm 10.0 and previous versions allow malicious users to execute arbitrary code via a crafted PNM file.

Vulnerable Product Search on Vulmon Subscribe to Product

netpbm netpbm 10.0

netpbm netpbm 9.20

netpbm netpbm 9.24

netpbm netpbm 9.25

netpbm netpbm 9.21

netpbm netpbm 9.22

netpbm netpbm 9.23

Vendor Advisories

Synopsis netpbm security update Type/Severity Security Advisory: Moderate Topic Updated netpbm packages that fix two security issues are now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The netpbm package contains ...
Debian Bug report logs - #351639 netpbm: [CVE-2005-3632, CVE-2005-3662] multiple buffer overflows in pnmtopng Package: netpbm; Maintainer for netpbm is Andreas Barth <aba@notsoarghorg>; Source for netpbm is src:netpbm-free (PTS, buildd, popcon) Reported by: Martin Pitt <mpitt@debianorg> Date: Mon, 6 Feb 2006 11: ...
Two buffer overflows were discovered in the ‘pnmtopng’ tool, which were triggered by processing an image with exactly 256 colors when using the -alpha option (CVE-2005-3662) or by processing a text file with very long lines when using the -text option (CVE-2005-3632) ...
Greg Roelofs discovered and fixed several buffer overflows in pnmtopng which is also included in netpbm, a collection of graphic conversion utilities, that can lead to the execution of arbitrary code via a specially crafted PNM file For the oldstable distribution (woody) these problems have been fixed in version 920-85 For the stable distributi ...