Lucene search

K
cve[email protected]CVE-2009-4274
HistoryFeb 12, 2010 - 9:30 p.m.

CVE-2009-4274

2010-02-1221:30:00
CWE-119
web.nvd.nist.gov
42
cve-2009-4274
netpbm
buffer overflow
denial of service
application crash
arbitrary code execution
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.2%

Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.

Affected configurations

NVD
Node
netpbmnetpbmMatch10.0
OR
netpbmnetpbmMatch10.1
OR
netpbmnetpbmMatch10.2
OR
netpbmnetpbmMatch10.3
OR
netpbmnetpbmMatch10.4
OR
netpbmnetpbmMatch10.5
OR
netpbmnetpbmMatch10.6
OR
netpbmnetpbmMatch10.7
OR
netpbmnetpbmMatch10.8
OR
netpbmnetpbmMatch10.9
OR
netpbmnetpbmMatch10.10
OR
netpbmnetpbmMatch10.11
OR
netpbmnetpbmMatch10.12
OR
netpbmnetpbmMatch10.13
OR
netpbmnetpbmMatch10.14
OR
netpbmnetpbmMatch10.15
OR
netpbmnetpbmMatch10.16
OR
netpbmnetpbmMatch10.17
OR
netpbmnetpbmMatch10.18
OR
netpbmnetpbmMatch10.19
OR
netpbmnetpbmMatch10.20
OR
netpbmnetpbmMatch10.21
OR
netpbmnetpbmMatch10.22
OR
netpbmnetpbmMatch10.23
OR
netpbmnetpbmMatch10.24
OR
netpbmnetpbmMatch10.25
OR
netpbmnetpbmMatch10.26
OR
netpbmnetpbmMatch10.27
OR
netpbmnetpbmMatch10.28
OR
netpbmnetpbmMatch10.29
OR
netpbmnetpbmMatch10.30
OR
netpbmnetpbmMatch10.31
OR
netpbmnetpbmMatch10.32
OR
netpbmnetpbmMatch10.33
OR
netpbmnetpbmMatch10.34
OR
netpbmnetpbmMatch10.35.00
OR
netpbmnetpbmMatch10.35.01
OR
netpbmnetpbmMatch10.35.02
OR
netpbmnetpbmMatch10.35.03
OR
netpbmnetpbmMatch10.35.04
OR
netpbmnetpbmMatch10.35.05
OR
netpbmnetpbmMatch10.35.06
OR
netpbmnetpbmMatch10.35.07
OR
netpbmnetpbmMatch10.35.08
OR
netpbmnetpbmMatch10.35.09
OR
netpbmnetpbmMatch10.35.10
OR
netpbmnetpbmMatch10.35.11
OR
netpbmnetpbmMatch10.35.12
OR
netpbmnetpbmMatch10.35.13
OR
netpbmnetpbmMatch10.35.14
OR
netpbmnetpbmMatch10.35.15
OR
netpbmnetpbmMatch10.35.16
OR
netpbmnetpbmMatch10.35.17
OR
netpbmnetpbmMatch10.35.18
OR
netpbmnetpbmMatch10.35.19
OR
netpbmnetpbmMatch10.35.20
OR
netpbmnetpbmMatch10.35.21
OR
netpbmnetpbmMatch10.35.22
OR
netpbmnetpbmMatch10.35.23
OR
netpbmnetpbmMatch10.35.24
OR
netpbmnetpbmMatch10.35.25
OR
netpbmnetpbmMatch10.35.26
OR
netpbmnetpbmMatch10.35.27
OR
netpbmnetpbmMatch10.35.28
OR
netpbmnetpbmMatch10.35.29
OR
netpbmnetpbmMatch10.35.30
OR
netpbmnetpbmMatch10.35.31
OR
netpbmnetpbmMatch10.35.32
OR
netpbmnetpbmMatch10.35.33
OR
netpbmnetpbmMatch10.35.34
OR
netpbmnetpbmMatch10.35.35
OR
netpbmnetpbmMatch10.35.36
OR
netpbmnetpbmMatch10.35.37
OR
netpbmnetpbmMatch10.35.38
OR
netpbmnetpbmMatch10.35.39
OR
netpbmnetpbmMatch10.35.40
OR
netpbmnetpbmMatch10.35.41
OR
netpbmnetpbmMatch10.35.42
OR
netpbmnetpbmMatch10.35.43
OR
netpbmnetpbmMatch10.35.44
OR
netpbmnetpbmMatch10.35.45
OR
netpbmnetpbmMatch10.35.46
OR
netpbmnetpbmMatch10.35.47
OR
netpbmnetpbmMatch10.36.00
OR
netpbmnetpbmMatch10.37.00
OR
netpbmnetpbmMatch10.38.00
OR
netpbmnetpbmMatch10.39.00
OR
netpbmnetpbmMatch10.40.00
OR
netpbmnetpbmMatch10.41.00
OR
netpbmnetpbmMatch10.42.00
OR
netpbmnetpbmMatch10.43.00
OR
netpbmnetpbmMatch10.44.00
OR
netpbmnetpbmMatch10.45.00
OR
netpbmnetpbmMatch10.46.00
OR
netpbmnetpbmMatch10.47.00
OR
netpbmnetpbmMatch10.47.01
OR
netpbmnetpbmMatch10.47.02
OR
netpbmnetpbmMatch10.47.03
OR
netpbmnetpbmMatch10.47.04
OR
netpbmnetpbmMatch10.47.05
OR
netpbmnetpbmMatch10.47.06

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.9 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.2%