Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200508-04] Netpbm: Arbitrary code execution in pstopnm


Vulnerability Assessment Details

[GLSA-200508-04] Netpbm: Arbitrary code execution in pstopnm

Vulnerability Assessment Summary
Netpbm: Arbitrary code execution in pstopnm

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200508-04
(Netpbm: Arbitrary code execution in pstopnm)


Max Vozeler reported that pstopnm calls the GhostScript
interpreter on untrusted PostScript files without specifying the
-dSAFER option, to convert a PostScript file into a PBM, PGM, or PNM
file.

Impact

A possible hacker could craft a malicious PostScript file and entice a
user to run pstopnm on it, resulting in the execution of arbitrary
commands with the permissions of the user running pstopnm.

Workaround

There is no known workaround at this time.

References:
http://secunia.com/advisories/16184/


Solution:
All Netpbm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/netpbm-10.28"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors


Supermicro X10SRW-F Server picture

Supermicro X10SRW-F Server

$169.99



Supermicro 815-6 4-Bay Server picture

Supermicro 815-6 4-Bay Server

$239.99



HP ProLiant Xeon E3-1220L V2 16 GB RAM 2.30 GHz MicroServer Gen8 NO DRIVES picture

HP ProLiant Xeon E3-1220L V2 16 GB RAM 2.30 GHz MicroServer Gen8 NO DRIVES

$174.99



Supermicro Server Tower Xeon BOOTS E5-2620 v4 2.10GHz 64GB RAM NO HDD NO OS picture

Supermicro Server Tower Xeon BOOTS E5-2620 v4 2.10GHz 64GB RAM NO HDD NO OS

$199.99



HPE PROLIANT MICROSERVER GEN10 PLUS MICRO TOWER SERVER - USED picture

HPE PROLIANT MICROSERVER GEN10 PLUS MICRO TOWER SERVER - USED

$550.00



HP ProLiant HSTNS-5151 Micro Server 8GB RAM No Drives/Key/Caddies *READ* picture

HP ProLiant HSTNS-5151 Micro Server 8GB RAM No Drives/Key/Caddies *READ*

$94.99



HPE Proliant Microserver Gen10 X3421 Perf AMS,  P03698-S01, 16GB Ram picture

HPE Proliant Microserver Gen10 X3421 Perf AMS, P03698-S01, 16GB Ram

$299.00



SuperMicro Server 505-2 Intel Atom 2.4GHz 8GB RAM SYS-5018A-FTN4 1U Rackmount picture

SuperMicro Server 505-2 Intel Atom 2.4GHz 8GB RAM SYS-5018A-FTN4 1U Rackmount

$202.49



1U Supermicro Server 10 Bay 2x Intel Xeon 3.3Ghz 8C 128GB RAM 480GB SSD 2x 10GBE picture

1U Supermicro Server 10 Bay 2x Intel Xeon 3.3Ghz 8C 128GB RAM 480GB SSD 2x 10GBE

$297.00



2U 12 Bay SAS3 SuperMicro Server 6028U-TR4T+ W/ X10DRU-i+ Barebone 12 Caddy RAIL picture

2U 12 Bay SAS3 SuperMicro Server 6028U-TR4T+ W/ X10DRU-i+ Barebone 12 Caddy RAIL

$299.00



Discussions

No Discussions have been posted on this vulnerability.