Описание
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 2:10.0-12.1ubuntu1 |
hardy | released | 2:10.0-11.1ubuntu0.1 |
intrepid | released | 2:10.0-12ubuntu0.8.10.1 |
jaunty | released | 2:10.0-12ubuntu0.9.04.1 |
karmic | released | 2:10.0-12ubuntu1.1 |
lucid | released | 2:10.0-12.1ubuntu1 |
upstream | released | 10.47.07 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm befo ...
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2