RHEL 2.1 / 3 / 4 : netpbm (RHSA-2008:0131)

Medium Nessus Plugin ID 31305


The remote Red Hat host is missing one or more security updates.


Updated netpbm packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, and 4.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The netpbm package contains a library of functions for editing and converting between various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others. The package includes no interactive tools and is primarily used by other programs (eg CGI scripts that manage website images).

An input validation flaw was discovered in the GIF-to-PNM converter (giftopnm) shipped with the netpbm package. An attacker could create a carefully crafted GIF file which could cause giftopnm to crash or possibly execute arbitrary code as the user running giftopnm.

All users are advised to upgrade to these updated packages which contain a backported patch which resolves this issue.


Update the affected netpbm, netpbm-devel and / or netpbm-progs packages.

See Also



Plugin Details

Severity: Medium

ID: 31305

File Name: redhat-RHSA-2008-0131.nasl

Version: $Revision: 1.17 $

Type: local

Agent: unix

Published: 2008/02/28

Modified: 2017/01/03

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:netpbm, p-cpe:/a:redhat:enterprise_linux:netpbm-devel, p-cpe:/a:redhat:enterprise_linux:netpbm-progs, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2008/02/28

Reference Information

CVE: CVE-2008-0554

RHSA: 2008:0131

CWE: 119