CVE-2005-2978

pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
References
Link Resource
http://secunia.com/advisories/17221
http://secunia.com/advisories/17222
http://secunia.com/advisories/17256
http://secunia.com/advisories/17265
http://secunia.com/advisories/17282
http://secunia.com/advisories/17357
http://securitytracker.com/id?1015071
http://www.debian.org/security/2005/dsa-878
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.redhat.com/support/errata/RHSA-2005-793.html Vendor Advisory
http://www.securityfocus.com/bid/15128
http://www.vupen.com/english/advisories/2005/2133
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278 Exploit Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
https://usn.ubuntu.com/210-1/
http://secunia.com/advisories/17221
http://secunia.com/advisories/17222
http://secunia.com/advisories/17256
http://secunia.com/advisories/17265
http://secunia.com/advisories/17282
http://secunia.com/advisories/17357
http://securitytracker.com/id?1015071
http://www.debian.org/security/2005/dsa-878
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.redhat.com/support/errata/RHSA-2005-793.html Vendor Advisory
http://www.securityfocus.com/bid/15128
http://www.vupen.com/english/advisories/2005/2133
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278 Exploit Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
https://usn.ubuntu.com/210-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://secunia.com/advisories/17221 - () http://secunia.com/advisories/17221 -
References () http://secunia.com/advisories/17222 - () http://secunia.com/advisories/17222 -
References () http://secunia.com/advisories/17256 - () http://secunia.com/advisories/17256 -
References () http://secunia.com/advisories/17265 - () http://secunia.com/advisories/17265 -
References () http://secunia.com/advisories/17282 - () http://secunia.com/advisories/17282 -
References () http://secunia.com/advisories/17357 - () http://secunia.com/advisories/17357 -
References () http://securitytracker.com/id?1015071 - () http://securitytracker.com/id?1015071 -
References () http://www.debian.org/security/2005/dsa-878 - () http://www.debian.org/security/2005/dsa-878 -
References () http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml -
References () http://www.novell.com/linux/security/advisories/2005_24_sr.html - () http://www.novell.com/linux/security/advisories/2005_24_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2005-793.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-793.html - Vendor Advisory
References () http://www.securityfocus.com/bid/15128 - () http://www.securityfocus.com/bid/15128 -
References () http://www.vupen.com/english/advisories/2005/2133 - () http://www.vupen.com/english/advisories/2005/2133 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278 - Exploit, Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278 - Exploit, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135 -
References () https://usn.ubuntu.com/210-1/ - () https://usn.ubuntu.com/210-1/ -

Information

Published : 2005-10-18 22:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2978

Mitre link : CVE-2005-2978

CVE.ORG link : CVE-2005-2978


JSON object : View

Products Affected

netpbm

  • netpbm