Vulnerability Name:

CVE-2005-3662 (CCN-23159)

Assigned:2005-11-12
Published:2005-11-12
Updated:2018-10-03
Summary:Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20060101-01-U

Source: CCN
Type: Neohapsis Archives Full Disclosure Message #0664
[USN-218-1] netpbm vulnerabilities

Source: MITRE
Type: CNA
CVE-2005-3662

Source: CCN
Type: Netpbm Web site
Netpbm home page

Source: CCN
Type: RHSA-2005-843
netpbm security update

Source: CCN
Type: SA17544
Pnmtopng "alphas_of_color" and "read_text" Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
17544

Source: SECUNIA
Type: Vendor Advisory
17671

Source: SECUNIA
Type: Vendor Advisory
17679

Source: SECUNIA
Type: Vendor Advisory
17828

Source: SECUNIA
Type: Vendor Advisory
18186

Source: SECUNIA
Type: Vendor Advisory
18517

Source: CCN
Type: SourceForge.net
PNG and MNG/JNG image formats: home site

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/project/shownotes.php?release_id=370545

Source: CCN
Type: ASA-2006-006
netpbm security update (RHSA-2005-843)

Source: DEBIAN
Type: UNKNOWN
DSA-904

Source: DEBIAN
Type: DSA-904
netpbm-free -- buffer overflows

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2005:217

Source: SUSE
Type: UNKNOWN
SUSE-SR:2005:028

Source: CCN
Type: OSVDB ID: 20838
png-mng pnmtopng alphas_of_color[] RGBA-palette PNG File Processing Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2005:843

Source: BID
Type: UNKNOWN
15427

Source: CCN
Type: BID-15427
PNMToPNG Alphas_Of_Color Buffer Overflow Vulnerability

Source: CCN
Type: USN-218-1
netpbm vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2005-2418

Source: XF
Type: UNKNOWN
pnmtopng-alpha-bo(23159)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9583

Source: UBUNTU
Type: UNKNOWN
USN-218-1

Source: SUSE
Type: SUSE-SR:2005:028
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
  • OR cpe:/a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
  • OR cpe:/a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
  • OR cpe:/a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
  • OR cpe:/a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20053662
    V
    CVE-2005-3662
    2015-11-16
    oval:org.mitre.oval:def:9583
    V
    Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.
    2013-04-29
    oval:com.redhat.rhsa:def:20050843
    P
    RHSA-2005:843: netpbm security update (Moderate)
    2005-12-20
    oval:org.debian:def:904
    V
    buffer overflows
    2005-11-21
    BACK
    greg_roelofs pnmtopng 2.37.3
    greg_roelofs pnmtopng 2.37.4
    greg_roelofs pnmtopng 2.37.5
    greg_roelofs pnmtopng 2.37.6
    greg_roelofs pnmtopng 2.38