Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-1142

Опубликовано: 15 апр. 2005
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gocrfixed0.39-5package

EPSS

Процентиль: 88%
0.04226
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

nvd
больше 20 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

github
больше 3 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

EPSS

Процентиль: 88%
0.04226
Низкий