Vulnerabilities > CVE-2005-2978 - Unspecified vulnerability in Netpbm
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN netpbm
nessus
Summary
pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
Vulnerable Configurations
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200510-18.NASL description The remote host is affected by the vulnerability described in GLSA-200510-18 (Netpbm: Buffer overflow in pnmtopng) RedHat reported that pnmtopng is vulnerable to a buffer overflow. Impact : An attacker could craft a malicious PNM file and entice a user to run pnmtopng on it, potentially resulting in the execution of arbitrary code with the permissions of the user running pnmtopng. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 20080 published 2005-10-24 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20080 title GLSA-200510-18 : Netpbm: Buffer overflow in pnmtopng code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200510-18. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(20080); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:42"); script_cve_id("CVE-2005-2978"); script_bugtraq_id(15128); script_xref(name:"GLSA", value:"200510-18"); script_name(english:"GLSA-200510-18 : Netpbm: Buffer overflow in pnmtopng"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200510-18 (Netpbm: Buffer overflow in pnmtopng) RedHat reported that pnmtopng is vulnerable to a buffer overflow. Impact : An attacker could craft a malicious PNM file and entice a user to run pnmtopng on it, potentially resulting in the execution of arbitrary code with the permissions of the user running pnmtopng. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200510-18" ); script_set_attribute( attribute:"solution", value: "All Netpbm users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose media-libs/netpbm" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:netpbm"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/10/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/24"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/14"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"media-libs/netpbm", unaffected:make_list("ge 10.29", "rge 10.26.32", "rge 10.26.33", "rge 10.26.42", "rge 10.26.43", "rge 10.26.44", "rge 10.26.48", "rge 10.26.49", "rge 10.26.52", "rge 10.26.53", "rge 10.26.59", "rge 10.26.61"), vulnerable:make_list("lt 10.29"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Netpbm"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-793.NASL description Updated netpbm packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The netpbm package contains a library of functions that support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others. A bug was found in the way netpbm converts Portable Anymap (PNM) files into Portable Network Graphics (PNG). The usage of uninitialised variables in the pnmtopng code allows an attacker to change stack contents when converting to PNG files with pnmtopng using the last seen 2020-06-01 modified 2020-06-02 plugin id 20058 published 2005-10-19 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20058 title RHEL 4 : netpbm (RHSA-2005:793) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_AE9FB0D7C4DC11DAB2FB000E0C2E438A.NASL description Ubuntu reports : A buffer overflow was found in the last seen 2020-06-01 modified 2020-06-02 plugin id 21493 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21493 title FreeBSD : netpbm -- buffer overflow in pnmtopng (ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-210-1.NASL description A buffer overflow was found in the last seen 2020-06-01 modified 2020-06-02 plugin id 20628 published 2006-01-15 reporter Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20628 title Ubuntu 4.10 / 5.04 / 5.10 : netpbm-free vulnerability (USN-210-1) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-878.NASL description A buffer overflow has been identified in the pnmtopng component of the netpbm package, a set of graphics conversion tools. This vulnerability could allow an attacker to execute arbitrary code as a local user by providing a specially crafted PNM file. The old stable distribution (woody) it not vulnerable to this problem. last seen 2020-06-01 modified 2020-06-02 plugin id 22744 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22744 title Debian DSA-878-1 : netpbm-free - buffer overflow NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2005-199.NASL description Pnmtopng in netpbm 10.2X, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack. Netpbm 9.2X is not affected by this vulnerability. The updated packages have been patched to correct this problem. last seen 2020-06-01 modified 2020-06-02 plugin id 20437 published 2006-01-15 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20437 title Mandrake Linux Security Advisory : netpbm (MDKSA-2005:199) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2005-793.NASL description Updated netpbm packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The netpbm package contains a library of functions that support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others. A bug was found in the way netpbm converts Portable Anymap (PNM) files into Portable Network Graphics (PNG). The usage of uninitialised variables in the pnmtopng code allows an attacker to change stack contents when converting to PNG files with pnmtopng using the last seen 2020-06-01 modified 2020-06-02 plugin id 21965 published 2006-07-05 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21965 title CentOS 4 : netpbm (CESA-2005:793)
Oval
accepted | 2013-04-29T04:02:06.560-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:10135 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||
title | pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack. | ||||||||||||
version | 26 |
Redhat
advisories |
| ||||
rpms |
|
References
- http://secunia.com/advisories/17221
- http://secunia.com/advisories/17221
- http://secunia.com/advisories/17222
- http://secunia.com/advisories/17222
- http://secunia.com/advisories/17256
- http://secunia.com/advisories/17256
- http://secunia.com/advisories/17265
- http://secunia.com/advisories/17265
- http://secunia.com/advisories/17282
- http://secunia.com/advisories/17282
- http://secunia.com/advisories/17357
- http://secunia.com/advisories/17357
- http://securitytracker.com/id?1015071
- http://securitytracker.com/id?1015071
- http://www.debian.org/security/2005/dsa-878
- http://www.debian.org/security/2005/dsa-878
- http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
- http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
- http://www.novell.com/linux/security/advisories/2005_24_sr.html
- http://www.novell.com/linux/security/advisories/2005_24_sr.html
- http://www.redhat.com/support/errata/RHSA-2005-793.html
- http://www.redhat.com/support/errata/RHSA-2005-793.html
- http://www.securityfocus.com/bid/15128
- http://www.securityfocus.com/bid/15128
- http://www.vupen.com/english/advisories/2005/2133
- http://www.vupen.com/english/advisories/2005/2133
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
- https://usn.ubuntu.com/210-1/
- https://usn.ubuntu.com/210-1/