GLSA-200508-04 : Netpbm: Arbitrary code execution in pstopnm
High Nessus Plugin ID 19388
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200508-04 (Netpbm: Arbitrary code execution in pstopnm)
Max Vozeler reported that pstopnm calls the GhostScript interpreter on untrusted PostScript files without specifying the -dSAFER option, to convert a PostScript file into a PBM, PGM, or PNM file.
An attacker could craft a malicious PostScript file and entice a user to run pstopnm on it, resulting in the execution of arbitrary commands with the permissions of the user running pstopnm.
There is no known workaround at this time.
SolutionAll Netpbm users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose media-libs/netpbm