[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2026 netpbm-free -- stack-based buffer overflow

ID: oval:org.mitre.oval:def:6850Date: (C)2010-05-24   (M)2023-12-26
Class: PATCHFamily: unix




Marc Schoenefeld discovered a stack-based buffer overflow in the XPM reader implementation in netpbm-free, a suite of image manipulation utilities. An attacker could cause a denial of service or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.

Platform:
Debian 5.0
Product:
netpbm-free
Reference:
DSA-2026
CVE-2009-4274
CVE    1
CVE-2009-4274
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies