Описание
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-2471
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
- http://secunia.com/advisories/16184
- http://secunia.com/advisories/18330
- http://secunia.com/advisories/19436
- http://securitytracker.com/id?1014752
- http://www.debian.org/security/2006/dsa-1021
- http://www.novell.com/linux/security/advisories/2005_19_sr.html
- http://www.osvdb.org/18253
- http://www.redhat.com/support/errata/RHSA-2005-743.html
- http://www.securityfocus.com/bid/14379
- http://www.trustix.org/errata/2005/0038
EPSS
CVE ID
Связанные уязвимости
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
pstopnm in netpbm does not properly use the "-dSAFER" option when call ...
EPSS