[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:317 -- Mandriva netpbm

ID: oval:org.secpod.oval:def:300488Date: (C)2012-01-07   (M)2023-12-26
Class: PATCHFamily: unix




Multiple security vulnerabilities has been identified and fixed in netpbm: Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation . Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf . pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service via a crafted image file that triggers an out-of-bounds read . Packages for 2008.0 are being provided due to extended support for Corporate products. This update fixes this vulnerability.

Platform:
Mandriva Linux 2008.0
Product:
netpbm
Reference:
MDVSA-2009:317
CVE-2008-4799
CVE-2008-3522
CVE-2008-3520
CVE    3
CVE-2008-3520
CVE-2008-3522
CVE-2008-4799
CPE    1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies