9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
netpbm is vulnerable to arbitrary code execution. The vulnerability exists as an input validation flaw and multiple integer overflows were discovered in the JasPer library providing support for JPEG-2000 image format and used in the jpeg2ktopam and pamtojpeg2k converters. An attacker could create a carefully-crafted JPEG file which could cause jpeg2ktopam to crash or, possibly, execute arbitrary code as the user running jpeg2ktopam.
CPE | Name | Operator | Version |
---|---|---|---|
netpbm | eq | 10.25__2.EL4.6.el4_6.1 | |
netpbm | eq | 10.25__2.EL4.6.el4_6.1 |
bugs.gentoo.org/show_bug.cgi?id=222819
rhn.redhat.com/errata/RHSA-2015-0698.html
secunia.com/advisories/33173
secunia.com/advisories/34391
security.gentoo.org/glsa/glsa-200812-18.xml
www.mandriva.com/security/advisories?name=MDVSA-2009:142
www.mandriva.com/security/advisories?name=MDVSA-2009:144
www.mandriva.com/security/advisories?name=MDVSA-2009:164
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2009-0012.html
www.securityfocus.com/bid/31470
www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
www.ubuntu.com/usn/USN-742-1
access.redhat.com/errata/RHSA-2009:0012
exchange.xforce.ibmcloud.com/vulnerabilities/45621
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141