Lucene search

K
gentooGentoo FoundationGLSA-201311-08
HistoryNov 13, 2013 - 12:00 a.m.

Netpbm: User-assisted arbitrary code execution

2013-11-1300:00:00
Gentoo Foundation
security.gentoo.org
11

0.021 Low

EPSS

Percentile

89.2%

Background

Netpbm is a toolkit for manipulation of graphic images, including conversion of images between a variety of different formats.

Description

A stack-based buffer overflow exists in converter/ppm/xpmtoppm.c in Netpbm.

Impact

A remote attacker could entice a user to open a specially crafted XMP file using Netpbm, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Netpbm users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/netpbm-10.49.00"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/netpbm< 10.49.00UNKNOWN