Netpbm

Netpbm

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.61%
  • Veröffentlicht 12.02.2010 21:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted hea...

  • EPSS 0.54%
  • Veröffentlicht 31.10.2008 00:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read.

  • EPSS 1.72%
  • Veröffentlicht 08.02.2008 02:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a simila...

  • EPSS 3.75%
  • Veröffentlicht 22.06.2006 22:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error.

  • EPSS 0.25%
  • Veröffentlicht 21.11.2005 22:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.

Exploit
  • EPSS 4.58%
  • Veröffentlicht 18.10.2005 22:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modif...

  • EPSS 2.06%
  • Veröffentlicht 05.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.

  • EPSS 0.1%
  • Veröffentlicht 17.02.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.

  • EPSS 3.88%
  • Veröffentlicht 31.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overf...