Vulnerabilities > CVE-2008-4799 - Numeric Errors vulnerability in Netpbm
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-317.NASL description Multiple security vulnerabilities has been identified and fixed in netpbm : Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation (CVE-2008-3520). Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (CVE-2008-3522). pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read (CVE-2008-4799). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update fixes this vulnerability. last seen 2020-06-01 modified 2020-06-02 plugin id 43020 published 2009-12-07 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/43020 title Mandriva Linux Security Advisory : netpbm (MDVSA-2009:317) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2009:317. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(43020); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:32:52"); script_cve_id( "CVE-2008-3520", "CVE-2008-3522", "CVE-2008-4799" ); script_bugtraq_id(31470); script_xref(name:"MDVSA", value:"2009:317"); script_name(english:"Mandriva Linux Security Advisory : netpbm (MDVSA-2009:317)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Multiple security vulnerabilities has been identified and fixed in netpbm : Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation (CVE-2008-3520). Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (CVE-2008-3522). pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read (CVE-2008-4799). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update fixes this vulnerability." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(119, 189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64netpbm-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64netpbm-static-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64netpbm10"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnetpbm-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnetpbm-static-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnetpbm10"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:netpbm"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/12/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/07"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64netpbm-devel-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64netpbm-static-devel-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64netpbm10-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libnetpbm-devel-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libnetpbm-static-devel-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libnetpbm10-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"netpbm-10.34-8.2mdv2008.0", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-262.NASL description A vulnerability has been found and corrected in netpbm : pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read (CVE-2008-4799). This update fixes this vulnerability. last seen 2020-06-01 modified 2020-06-02 plugin id 42090 published 2009-10-12 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42090 title Mandriva Linux Security Advisory : netpbm (MDVSA-2009:262)
Statements
contributor | Tomas Hoger |
lastmodified | 2008-10-31 |
organization | Red Hat |
statement | This issue can only cause pamperspective to crash when used on specially crafted messages. We do not consider this to be a security issue. |
References
- http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY
- http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY
- http://www.openwall.com/lists/oss-security/2008/10/22/7
- http://www.openwall.com/lists/oss-security/2008/10/22/7
- http://www.openwall.com/lists/oss-security/2008/10/23/2
- http://www.openwall.com/lists/oss-security/2008/10/23/2
- http://www.securityfocus.com/bid/31871
- http://www.securityfocus.com/bid/31871
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46054
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html