First published: Thu Feb 28 2008(Updated: )
The netpbm package contains a library of functions for editing and<br>converting between various graphics file formats, including .pbm (portable<br>bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable<br>pixmaps) and others. The package includes no interactive tools and is<br>primarily used by other programs (eg CGI scripts that manage web-site<br>images).<br>An input validation flaw was discovered in the GIF-to-PNM converter<br>(giftopnm) shipped with the netpbm package. An attacker could create a<br>carefully crafted GIF file which could cause giftopnm to crash or possibly<br>execute arbitrary code as the user running giftopnm. (CVE-2008-0554)<br>All users are advised to upgrade to these updated packages which contain a<br>backported patch which resolves this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/netpbm | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
redhat/netpbm | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
redhat/netpbm-devel | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
redhat/netpbm-progs | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
redhat/netpbm-devel | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
redhat/netpbm-progs | <10.25-2.EL4.6.el4_6.1 | 10.25-2.EL4.6.el4_6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0131 is classified as moderate.
To fix RHSA-2008:0131, upgrade the netpbm package to version 10.25-2.EL4.6.el4_6.1 or later.
RHSA-2008:0131 affects the netpbm, netpbm-devel, and netpbm-progs packages.
Yes, RHSA-2008:0131 addresses vulnerabilities in the netpbm package that could be exploited.
RHSA-2008:0131 impacts the EL4_6 platform, including both x86_64 and specific architecture variants.