Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2005-3632
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-21 Nov, 2005 | 22:03
Updated At-03 Apr, 2025 | 01:03

Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

netpbm
netpbm
>>netpbm>>9.20
cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>9.21
cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>9.22
cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>9.23
cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>9.24
cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>9.25
cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
netpbm
netpbm
>>netpbm>>10.0
cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/17544secalert@redhat.com
N/A
http://secunia.com/advisories/17671secalert@redhat.com
N/A
http://secunia.com/advisories/17679secalert@redhat.com
N/A
http://secunia.com/advisories/17828secalert@redhat.com
N/A
http://secunia.com/advisories/18186secalert@redhat.com
N/A
http://www.debian.org/security/2005/dsa-904secalert@redhat.com
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:217secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2005_28_sr.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2005-843.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/15514secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2005/2418secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165secalert@redhat.com
N/A
https://usn.ubuntu.com/218-1/secalert@redhat.com
N/A
http://secunia.com/advisories/17544af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/17671af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/17679af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/17828af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18186af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2005/dsa-904af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:217af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2005_28_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2005-843.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/15514af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2005/2418af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/218-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found