CVE-2009-4274
Published: 12 February 2010
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Notes
Author | Note |
---|---|
kees | stack protection in Edgy and later makes this a DoS only. |
Priority
Status
Package | Release | Status |
---|---|---|
netpbm-free Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Released
(2:10.0-11.1ubuntu0.1)
|
|
intrepid |
Released
(2:10.0-12ubuntu0.8.10.1)
|
|
jaunty |
Released
(2:10.0-12ubuntu0.9.04.1)
|
|
karmic |
Released
(2:10.0-12ubuntu1.1)
|
|
lucid |
Released
(2:10.0-12.1ubuntu1)
|
|
upstream |
Released
(10.47.07)
|
|
Patches: upstream: http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076 |