This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated netpbm packages that fix a security issue are now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
The netpbm package contains a library of functions that support
programs for handling various graphics file formats, including .pbm
(portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps),
.ppm (portable pixmaps) and others.
A bug was found in the way netpbm converts PostScript files into PBM,
PGM or PPM files. An attacker could create a carefully crafted
PostScript file in such a way that it could execute arbitrary commands
when the file is processed by a victim using pstopnm. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-2471
to this issue.
All users of netpbm should upgrade to the updated packages, which
contain a backported patch to resolve this issue.
See also :
Update the affected netpbm, netpbm-devel and / or netpbm-progs
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 19488 ()
Bugtraq ID: 1437915128
CVE ID: CVE-2005-2471
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.