blob: 8fde1cebaf860c247dc73dbcff7fe7c2082922c9 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-04">
<title>Netpbm: Arbitrary code execution in pstopnm</title>
The pstopnm utility, part of the Netpbm tools, contains a vulnerability
which can potentially result in the execution of arbitrary code.
<product type="ebuild">Netpbm</product>
<announced>August 05, 2005</announced>
<revised>May 28, 2009: 06</revised>
<package name="media-libs/netpbm" auto="yes" arch="*">
<unaffected range="ge">10.28</unaffected>
<unaffected range="rge">10.26.32</unaffected>
<unaffected range="rge">10.26.33</unaffected>
<unaffected range="rge">10.26.42</unaffected>
<unaffected range="rge">10.26.43</unaffected>
<unaffected range="rge">10.26.44</unaffected>
<unaffected range="rge">10.26.48</unaffected>
<unaffected range="rge">10.26.49</unaffected>
<unaffected range="rge">10.26.59</unaffected>
<unaffected range="rge">10.26.61</unaffected>
<vulnerable range="lt">10.28</vulnerable>
Netpbm is a package of 220 graphics programs and a programming
libraries, including pstopnm. pstopnm is a tool which converts
PostScript files to PNM image files.
Max Vozeler reported that pstopnm calls the GhostScript interpreter on
untrusted PostScript files without specifying the -dSAFER option, to
convert a PostScript file into a PBM, PGM, or PNM file.
<impact type="normal">
An attacker could craft a malicious PostScript file and entice a user
to run pstopnm on it, resulting in the execution of arbitrary commands
with the permissions of the user running pstopnm.
There is no known workaround at this time.
All Netpbm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose media-libs/netpbm</code>
<uri link="">CAN-2005-2471</uri>
<uri link="">Secunia Advisory SA16184</uri>
<metadata tag="requester" timestamp="Tue, 02 Aug 2005 10:10:20 +0000">
<metadata tag="submitter" timestamp="Tue, 02 Aug 2005 11:24:11 +0000">
<metadata tag="bugReady" timestamp="Fri, 05 Aug 2005 10:42:23 +0000">