NetPBM PNMToPNG Buffer Overflow Vulnerability

pnmtopng is susceptible to a buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue reportedly only occurs when the '-trans' command line option is utilized.

This issue allows attackers to create malicious PNM files, that when parsed by the affected utility, allow arbitrary machine code to be executed. This occurs in the context of the user running the affected utility.

This vulnerability was reported in version 10.0 of NetPBM. Other versions may also be affected.


Privacy Statement
Copyright 2010, SecurityFocus