First published: Fri Dec 11 2009(Updated: )
Marc Schoenefeld found a stack-based buffer overflow in the way netpbm graphics file formats handling library used to process content of header fields of the X PixMap (XPM) image file. A remote attacker could provide a specially-crafted XPM image file and trick the local user into processing it, which would lead to denial of service (crash of application using the netpbm library) or, potentially, to execution of arbitrary code with the privileges of that application.
Affected Software | Affected Version | How to fix |
---|---|---|
Netpbm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-546580 is critical due to the potential for remote code execution.
You can fix REDHAT-BUG-546580 by updating to the latest patched version of the Netpbm library.
REDHAT-BUG-546580 is caused by a stack-based buffer overflow in the processing of XPM image files.
Any user or application using the Netpbm graphics file library is potentially affected by REDHAT-BUG-546580.
Yes, REDHAT-BUG-546580 can be exploited remotely if a user processes a maliciously crafted XPM image.