pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
http://www.trustix.org/errata/2005/0038/
http://www.securityfocus.com/bid/14379
http://www.redhat.com/support/errata/RHSA-2005-743.html
http://www.novell.com/linux/security/advisories/2005_19_sr.html
http://www.debian.org/security/2006/dsa-1021
http://securitytracker.com/id?1014752
http://secunia.com/advisories/19436
http://secunia.com/advisories/18330