Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-031: netpbm

Vulnerability Assessment Details

RHSA-2004-031: netpbm

Vulnerability Assessment Summary
Check for the version of the netpbm packages

Detailed Explanation for this Vulnerability Assessment

Updated NetPBM packages are available that fix a number of temporary file
vulnerabilities in the netpbm libraries.

The netpbm package contains a library of functions that support
programs for handling various graphics file formats, including .pbm
(portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps),
.ppm (portable pixmaps), and others.

A number of temporary file bugs have been found in versions of NetPBM.
These could make it possible for a local user to overwrite or create files
as a different user who happens to run one of the the vulnerable utilities.
The Common Vulnerabilities and Exposures project ( has
assigned the name CVE-2003-0924 to this issue.

Users are advised to upgrade to the erratum packages, which contain patches
from Debian that correct these bugs.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Samsung 960 PRO 512GB SSD Internal PCI Express 3.0 x4 NVMe Solid State Drive M.2
Samsung 960 PRO 512GB SSD Internal PCI Express 3.0 x4 NVMe Solid State Drive M.2 pictureSAMSUNG 860 EVO Series 2.5" 500GB SATA III SSD
SAMSUNG 860 EVO Series 2.5Samsung SM-T280 Galaxy Tab A Nook 7" 1280 x 800 8GB ROM 1.5GB RAM 1.3GHz
Samsung SM-T280 Galaxy Tab A Nook 7


No Discussions have been posted on this vulnerability.