RHEL 2.1 / 3 / 4 : netpbm (RHSA-2005:743)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated netpbm packages that fix a security issue are now available.

This update has been rated as having low security impact by the Red
Hat Security Response Team.

The netpbm package contains a library of functions that support
programs for handling various graphics file formats, including .pbm
(portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps),
.ppm (portable pixmaps) and others.

A bug was found in the way netpbm converts PostScript files into PBM,
PGM or PPM files. An attacker could create a carefully crafted
PostScript file in such a way that it could execute arbitrary commands
when the file is processed by a victim using pstopnm. The Common
Vulnerabilities and Exposures project assigned the name CVE-2005-2471
to this issue.

All users of netpbm should upgrade to the updated packages, which
contain a backported patch to resolve this issue.

See also :


Solution :

Update the affected netpbm, netpbm-devel and / or netpbm-progs

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 19488 ()

Bugtraq ID: 14379

CVE ID: CVE-2005-2471

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now