Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.novell.com/linux/security/advisories/2005_28_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.redhat.com/support/errata/RHSA-2005-843.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/17544 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/15514 | vdb-entry x_refsource_BID x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.vupen.com/english/advisories/2005/2418 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:217 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://secunia.com/advisories/17679 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/17828 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/18186 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/17671 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://usn.ubuntu.com/218-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.debian.org/security/2005/dsa-904 | vendor-advisory x_refsource_DEBIAN x_transferred |
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.6 | MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |