CentOS 3 / 4 : netpbm (CESA-2005:743)

high Nessus Plugin ID 21958

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated netpbm packages that fix a security issue are now available.

This update has been rated as having low security impact by the Red Hat Security Response Team.

The netpbm package contains a library of functions that support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others.

A bug was found in the way netpbm converts PostScript files into PBM, PGM or PPM files. An attacker could create a carefully crafted PostScript file in such a way that it could execute arbitrary commands when the file is processed by a victim using pstopnm. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2471 to this issue.

All users of netpbm should upgrade to the updated packages, which contain a backported patch to resolve this issue.

Solution

Update the affected netpbm packages.

See Also

http://www.nessus.org/u?c6a64fd9

http://www.nessus.org/u?6c4e1967

http://www.nessus.org/u?0af87e4c

http://www.nessus.org/u?bba61718

http://www.nessus.org/u?fd0120f2

http://www.nessus.org/u?d6db3c13

Plugin Details

Severity: High

ID: 21958

File Name: centos_RHSA-2005-743.nasl

Version: 1.19

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:netpbm-devel, p-cpe:/a:centos:centos:netpbm-progs, cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:netpbm

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/22/2005

Vulnerability Publication Date: 8/5/2005

Reference Information

CVE: CVE-2005-2471

BID: 14379, 15128

RHSA: 2005:743