RHEL 2.1 / 3 / 4 : netpbm (RHSA-2005:743)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated netpbm packages that fix a security issue are now available.

This update has been rated as having low security impact by the Red
Hat Security Response Team.

The netpbm package contains a library of functions that support
programs for handling various graphics file formats, including .pbm
(portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps),
.ppm (portable pixmaps) and others.

A bug was found in the way netpbm converts PostScript files into PBM,
PGM or PPM files. An attacker could create a carefully crafted
PostScript file in such a way that it could execute arbitrary commands
when the file is processed by a victim using pstopnm. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-2471
to this issue.

All users of netpbm should upgrade to the updated packages, which
contain a backported patch to resolve this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2005-2471.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
http://rhn.redhat.com/errata/RHSA-2005-743.html

Solution :

Update the affected netpbm, netpbm-devel and / or netpbm-progs
packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 19488 ()

Bugtraq ID:

CVE ID: CVE-2005-2471