![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55661 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2005:793 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2005:793. The netpbm package contains a library of functions that support programs for handling various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps) and others. A bug was found in the way netpbm converts Portable Anymap (PNM) files into Portable Network Graphics (PNG). The usage of uninitialised variables in the pnmtopng code allows an attacker to change stack contents when converting to PNG files with pnmtopng using the '-trans' option. This may allow an attacker to execute arbitrary code. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2978 to this issue. All users of netpbm should upgrade to the updated packages, which contain a backported patch to resolve this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2005-793.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
BugTraq ID: 15128 Common Vulnerability Exposure (CVE) ID: CVE-2005-2978 1015071 http://securitytracker.com/id?1015071 15128 http://www.securityfocus.com/bid/15128 17221 http://secunia.com/advisories/17221 17222 http://secunia.com/advisories/17222 17256 http://secunia.com/advisories/17256 17265 http://secunia.com/advisories/17265 17282 http://secunia.com/advisories/17282 17357 http://secunia.com/advisories/17357 ADV-2005-2133 http://www.vupen.com/english/advisories/2005/2133 DSA-878 http://www.debian.org/security/2005/dsa-878 GLSA-200510-18 http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml RHSA-2005:793 http://www.redhat.com/support/errata/RHSA-2005-793.html SUSE-SR:2005:024 http://www.novell.com/linux/security/advisories/2005_24_sr.html USN-210-1 https://usn.ubuntu.com/210-1/ https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278 oval:org.mitre.oval:def:10135 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |