4.6
CVSSv2

CVE-2005-3662

Published: 18/11/2005 Updated: 03/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Off-by-one buffer overflow in pnmtopng prior to 2.39, when using the -alpha command line option (Alphas_Of_Color), allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.

Vulnerable Product Search on Vulmon Subscribe to Product

greg roelofs pnmtopng 2.37.5

greg roelofs pnmtopng 2.37.6

greg roelofs pnmtopng 2.37.3

greg roelofs pnmtopng 2.37.4

greg roelofs pnmtopng 2.38

Vendor Advisories

Synopsis netpbm security update Type/Severity Security Advisory: Moderate Topic Updated netpbm packages that fix two security issues are now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The netpbm package contains ...
Debian Bug report logs - #351639 netpbm: [CVE-2005-3632, CVE-2005-3662] multiple buffer overflows in pnmtopng Package: netpbm; Maintainer for netpbm is Andreas Barth <aba@notsoarghorg>; Source for netpbm is src:netpbm-free (PTS, buildd, popcon) Reported by: Martin Pitt <mpitt@debianorg> Date: Mon, 6 Feb 2006 11: ...
Two buffer overflows were discovered in the ‘pnmtopng’ tool, which were triggered by processing an image with exactly 256 colors when using the -alpha option (CVE-2005-3662) or by processing a text file with very long lines when using the -text option (CVE-2005-3632) ...
Greg Roelofs discovered and fixed several buffer overflows in pnmtopng which is also included in netpbm, a collection of graphic conversion utilities, that can lead to the execution of arbitrary code via a specially crafted PNM file For the oldstable distribution (woody) these problems have been fixed in version 920-85 For the stable distributi ...