pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/21500 | vdb entry |
http://www.securityfocus.com/bid/14379 | vdb entry |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645 | signature vdb entry |
http://www.trustix.org/errata/2005/0038/ | vendor advisory |
http://www.debian.org/security/2006/dsa-1021 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757 | |
http://secunia.com/advisories/18330 | third party advisory vendor advisory |
http://securitytracker.com/id?1014752 | vdb entry |
http://secunia.com/advisories/19436 | third party advisory vendor advisory |
http://secunia.com/advisories/16184 | third party advisory vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-743.html | vendor advisory |
http://www.osvdb.org/18253 | vdb entry |