Lucene search

K
certCERTVU:630433
HistoryMar 17, 2003 - 12:00 a.m.

NetPBM contains multiple buffer overflow vulnerabilities

2003-03-1700:00:00
www.kb.cert.org
8

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.09 Low

EPSS

Percentile

94.7%

Overview

NetPBM is a set of graphics conversion tools and has been found to contain multiple buffer overflow vulnerabilities.

Description

A code review of NetPBM has revealed multiple buffer overflow vulnerabilities. These vulnerabilities could be exploited by loading malicious image files.


Impact

The complete impact of these vulnerabilities is not yet known, but could range from a denial of service or potential execution of code.


Solution

Please see your vendor notification for a vendor specific patch.


Vendor Information

630433

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Debian __ Affected

Updated: March 17, 2003

Status

Affected

Vendor Statement

Please see <http://www.debian.org/security/2003/dsa-263&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

NetPBM Affected

Notified: December 20, 2002 Updated: March 17, 2003

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Red Hat Inc. __ Affected

Updated: April 03, 2003

Status

Affected

Vendor Statement

Red Hat Linux and Red Hat Enterprise Linux ship with a NetPBM package vulnerable to these issues. Updated NetPBM packages are available along with our advisory at the URLs below. Users of the Red Hat Network can update their systems using the ‘up2date’ tool.

Red Hat Enterprise Linux:

<http://rhn.redhat.com/errata/RHSA-2003-061.html&gt;
Red Hat Linux:

<http://rhn.redhat.com/errata/RHSA-2003-060.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Apple Computer Inc. __ Not Affected

Updated: March 17, 2003

Status

Not Affected

Vendor Statement

Mac OS X and Mac OS X Server do not contain the vulnerabilities described in this report.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Fujitsu __ Not Affected

Updated: March 17, 2003

Status

Not Affected

Vendor Statement

Fujitsu’s UXP/V o.s. does not support the Utah Raster Toolkit or netpbm, so it is not vulnerable to the vulnerabilities reported in this VU report.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Hewlett-Packard Company __ Not Affected

Updated: March 17, 2003

Status

Not Affected

Vendor Statement

------------------------------------- Source: Hewlett-Packard Company Software Security Response Team

HP-UX - not vulnerable HP-MPE/ix - not vulnerable HP Tru64 UNIX - not vulnerable HP OpenVMS - not vulnerable HP NonStop Servers - not vulnerable
To report potential security vulnerabilities in HP software, send an E-mail message to: ``[mailto:[email protected]](&lt;mailto:[email protected]&gt;)``

--------------------------------------

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Ingrian Networks __ Not Affected

Updated: March 17, 2003

Status

Not Affected

Vendor Statement

Ingrian Networks products are not vulnerable to VU#378049 or VU#630433.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

Microsoft Corporation __ Not Affected

Updated: March 17, 2003

Status

Not Affected

Vendor Statement

Microsoft has confirmed this issue does not affect our software.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23630433 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.securityfocus.com/bid/6979&gt;

Acknowledgements

Thanks to Alan Cox for reporting this vulnerability and creating the initial fixes and to Al Viro for discovering the original flaw. We also thank Martin Schulze and Sebastian Kramer provided additional fixes to the patches.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2003-0146
Severity Metric: 1.01 Date Public:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.09 Low

EPSS

Percentile

94.7%