![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55921 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu USN-218-1 (netpbm-free) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to netpbm-free announced via advisory USN-218-1. A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: netpbm Two buffer overflows were discovered in the 'pnmtopng' tool, which were triggered by processing an image with exactly 256 colors when using the -alpha option (CVE-2005-3662) or by processing a text file with very long lines when using the -text option (CVE-2005-3632). A remote attacker could exploit these to execute arbitrary code by tricking an user or an automated system into processing a specially crafted PNM file with pnmtopng. Solution: The problem can be corrected by upgrading the affected package to version 2:10.0-5ubuntu0.3 (for Ubuntu 4.10), 2:10.0-8ubuntu0.3 (for Ubuntu 5.04), or 2:10.0-8ubuntu1.2 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. http://www.securityspace.com/smysecure/catid.html?in=USN-218-1 Risk factor : Medium CVSS Score: 4.6 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-3632 15514 http://www.securityfocus.com/bid/15514 17544 http://secunia.com/advisories/17544 17671 http://secunia.com/advisories/17671 17679 http://secunia.com/advisories/17679 17828 http://secunia.com/advisories/17828 18186 http://secunia.com/advisories/18186 ADV-2005-2418 http://www.vupen.com/english/advisories/2005/2418 DSA-904 http://www.debian.org/security/2005/dsa-904 MDKSA-2005:217 http://www.mandriva.com/security/advisories?name=MDKSA-2005:217 RHSA-2005:843 http://www.redhat.com/support/errata/RHSA-2005-843.html SUSE-SR:2005:028 http://www.novell.com/linux/security/advisories/2005_28_sr.html USN-218-1 https://usn.ubuntu.com/218-1/ oval:org.mitre.oval:def:11165 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165 Common Vulnerability Exposure (CVE) ID: CVE-2005-3662 15427 http://www.securityfocus.com/bid/15427 18517 http://secunia.com/advisories/18517 20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U http://sourceforge.net/project/shownotes.php?release_id=370545 oval:org.mitre.oval:def:9583 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |