CVE-2006-3145
https://notcve.org/view.php?id=CVE-2006-3145
Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error. Desbordamiento de búfer en pamtofits de NetPBM v10.30 hasta 10.33, permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección en el ensamblado de la cabecera, relacionado posiblemente con un error de superación de límite. • http://secunia.com/advisories/20729 http://secunia.com/advisories/20775 http://sourceforge.net/project/shownotes.php?release_id=425770 http://www.securityfocus.com/bid/18525 http://www.trustix.org/errata/2006/0037 http://www.vupen.com/english/advisories/2006/2449 https://exchange.xforce.ibmcloud.com/vulnerabilities/27244 •
CVE-2005-3632
https://notcve.org/view.php?id=CVE-2005-3632
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file. • http://secunia.com/advisories/17544 http://secunia.com/advisories/17671 http://secunia.com/advisories/17679 http://secunia.com/advisories/17828 http://secunia.com/advisories/18186 http://www.debian.org/security/2005/dsa-904 http://www.mandriva.com/security/advisories?name=MDKSA-2005:217 http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.redhat.com/support/errata/RHSA-2005-843.html http://www.securityfocus.com/bid/15514 http://www.vupen.com/e •
CVE-2005-2978
https://notcve.org/view.php?id=CVE-2005-2978
pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack. • http://secunia.com/advisories/17221 http://secunia.com/advisories/17222 http://secunia.com/advisories/17256 http://secunia.com/advisories/17265 http://secunia.com/advisories/17282 http://secunia.com/advisories/17357 http://securitytracker.com/id?1015071 http://www.debian.org/security/2005/dsa-878 http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml http://www.novell.com/linux/security/advisories/2005_24_sr.html http://www.redhat.com/support/errata/RHSA-2005-793& •
CVE-2005-2471
https://notcve.org/view.php?id=CVE-2005-2471
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands. pstopnm en netpbm no usa adecuadamente la opción "-dSAFER" (cuando llama a Ghostscript para convertir un archivo PostScript en un pbm, pgm o pnm), lo que permite que atacantes remotos con la intervención del usuario puedan ejecutar comandos arbitrarios. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757 http://secunia.com/advisories/16184 http://secunia.com/advisories/18330 http://secunia.com/advisories/19436 http://securitytracker.com/id?1014752 http://www.debian.org/security/2006/dsa-1021 http://www.novell.com/linux/security/advisories/2005_19_sr.html http://www.osvdb.org/18253 http://www.redhat.com/support/errata/RHSA-2005-743.html http://www.securityfocus.com/bid/14379 http://www.trustix.org/errata/200 •
CVE-2003-0924
https://notcve.org/view.php?id=CVE-2003-0924
netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files. netpbm 2:9.25 y anteriores no crea adecuadamente ficheros temporales, lo que permite a usuarios locales sobreescribir ficheros arbitrarios. • ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc http://www.debian.org/security/2004/dsa-426 http://www.gentoo.org/security/en/glsa/glsa-200410-02.xml http://www.kb.cert.org/vuls/id/487102 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:011 http://www.redhat.com/support/errata/RHSA-2004-030.html http://www.redhat.com/support/errata/RHSA-2004-031.html http://www.securityfocus.com/bid/9442 https://exchange.xforce.ibmcloud.com •