Vulnerability Description
pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netpbm | Netpbm | 2.10.0.8 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
- http://secunia.com/advisories/16184Vendor Advisory
- http://secunia.com/advisories/18330Vendor Advisory
- http://secunia.com/advisories/19436Vendor Advisory
- http://securitytracker.com/id?1014752
- http://www.debian.org/security/2006/dsa-1021
- http://www.novell.com/linux/security/advisories/2005_19_sr.html
- http://www.osvdb.org/18253
- http://www.redhat.com/support/errata/RHSA-2005-743.html
- http://www.securityfocus.com/bid/14379
- http://www.trustix.org/errata/2005/0038/Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
- http://secunia.com/advisories/16184Vendor Advisory
FAQ
What is CVE-2005-2471?
CVE-2005-2471 is a vulnerability with a CVSS score of 7.5 (HIGH). pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attacke...
How severe is CVE-2005-2471?
CVE-2005-2471 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2471?
Check the references section above for vendor advisories and patch information. Affected products include: Netpbm Netpbm.