← Voltar para CVEs
CVE-2005-2978
N/ADescricao
pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado10/18/2005
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
netpbm:netpbm
Referencias
http://secunia.com/advisories/17221(secalert@redhat.com)
http://secunia.com/advisories/17222(secalert@redhat.com)
http://secunia.com/advisories/17256(secalert@redhat.com)
http://secunia.com/advisories/17265(secalert@redhat.com)
http://secunia.com/advisories/17282(secalert@redhat.com)
http://secunia.com/advisories/17357(secalert@redhat.com)
http://securitytracker.com/id?1015071(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-878(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_24_sr.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-793.html(secalert@redhat.com)
http://www.securityfocus.com/bid/15128(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/2133(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135(secalert@redhat.com)
https://usn.ubuntu.com/210-1/(secalert@redhat.com)
http://secunia.com/advisories/17221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17222(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17256(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17265(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17282(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17357(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015071(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-878(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_24_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-793.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15128(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2133(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/210-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.