Vulnerability Name: | CVE-2005-3632 (CCN-23163) | ||||||||||||||||||||
Assigned: | 2005-11-12 | ||||||||||||||||||||
Published: | 2005-11-12 | ||||||||||||||||||||
Updated: | 2018-10-03 | ||||||||||||||||||||
Summary: | Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file. | ||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: CCN Type: Neohapsis Archives Full Disclosure Message #0664 [USN-218-1] netpbm vulnerabilities Source: MITRE Type: CNA CVE-2005-3632 Source: CCN Type: Netpbm Web site Netpbm home page Source: CCN Type: RHSA-2005-843 netpbm security update Source: CCN Type: SA17544 Pnmtopng "alphas_of_color" and "read_text" Buffer Overflow Vulnerabilities Source: SECUNIA Type: UNKNOWN 17544 Source: SECUNIA Type: UNKNOWN 17671 Source: SECUNIA Type: UNKNOWN 17679 Source: SECUNIA Type: UNKNOWN 17828 Source: SECUNIA Type: UNKNOWN 18186 Source: CCN Type: SourceForge.net PNG and MNG/JNG image formats: home site Source: CCN Type: ASA-2006-006 netpbm security update (RHSA-2005-843) Source: DEBIAN Type: Patch, Vendor Advisory DSA-904 Source: DEBIAN Type: DSA-904 netpbm-free -- buffer overflows Source: MANDRIVA Type: UNKNOWN MDKSA-2005:217 Source: SUSE Type: UNKNOWN SUSE-SR:2005:028 Source: REDHAT Type: UNKNOWN RHSA-2005:843 Source: BID Type: UNKNOWN 15514 Source: CCN Type: BID-15514 NetPBM PNMToPNG Long Text Line Buffer Overflow Vulnerability Source: CCN Type: USN-218-1 netpbm vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2005-2418 Source: XF Type: UNKNOWN pnmtopng-text-bo(23163) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11165 Source: UBUNTU Type: UNKNOWN USN-218-1 Source: SUSE Type: SUSE-SR:2005:028 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |