This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200508-04
(Netpbm: Arbitrary code execution in pstopnm)
Max Vozeler reported that pstopnm calls the GhostScript interpreter on
untrusted PostScript files without specifying the -dSAFER option, to
convert a PostScript file into a PBM, PGM, or PNM file.
An attacker could craft a malicious PostScript file and entice a user
to run pstopnm on it, resulting in the execution of arbitrary commands
with the permissions of the user running pstopnm.
There is no known workaround at this time.
See also :
All Netpbm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose media-libs/netpbm
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 19388 (gentoo_GLSA-200508-04.nasl)
CVE ID: CVE-2005-2471