← Retour aux CVEs
CVE-2005-2978
N/ADescription
pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
Details CVE
Score CVSS v3.1N/A
Publie10/18/2005
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
netpbm:netpbm
References
http://secunia.com/advisories/17221(secalert@redhat.com)
http://secunia.com/advisories/17222(secalert@redhat.com)
http://secunia.com/advisories/17256(secalert@redhat.com)
http://secunia.com/advisories/17265(secalert@redhat.com)
http://secunia.com/advisories/17282(secalert@redhat.com)
http://secunia.com/advisories/17357(secalert@redhat.com)
http://securitytracker.com/id?1015071(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-878(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_24_sr.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-793.html(secalert@redhat.com)
http://www.securityfocus.com/bid/15128(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/2133(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135(secalert@redhat.com)
https://usn.ubuntu.com/210-1/(secalert@redhat.com)
http://secunia.com/advisories/17221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17222(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17256(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17265(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17282(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17357(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015071(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-878(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_24_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-793.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15128(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2133(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/210-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.