what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

usn-218-1.txt

usn-218-1.txt
Posted Nov 22, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-218-1 - Two buffer overflows were discovered in the 'pnmtopng' tool, which were triggered by processing an image with exactly 256 colors when using the -alpha option (CVE-2005-3662) or by processing a text file with very long lines when using the -text option (CVE-2005-3632).

tags | advisory, overflow
systems | linux, ubuntu
SHA-256 | 186205740c073a6c3a2123b8b2b81ee862292ac19e01abb4acb5c901ee7951e5

usn-218-1.txt

Change Mirror Download

--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

===========================================================
Ubuntu Security Notice USN-218-1 November 21, 2005
netpbm-free vulnerabilities
CVE-2005-3632, CVE-2005-3662
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

netpbm

The problem can be corrected by upgrading the affected package to
version 2:10.0-5ubuntu0.3 (for Ubuntu 4.10), 2:10.0-8ubuntu0.3 (for
Ubuntu 5.04), or 2:10.0-8ubuntu1.2 (for Ubuntu 5.10). In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Two buffer overflows were discovered in the 'pnmtopng' tool, which
were triggered by processing an image with exactly 256 colors when
using the -alpha option (CVE-2005-3662) or by processing a text file
with very long lines when using the -text option (CVE-2005-3632).

A remote attacker could exploit these to execute arbitrary code by
tricking an user or an automated system into processing a specially
crafted PNM file with pnmtopng.


Updated packages for Ubuntu 4.10:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-5ubuntu0.3.diff.gz
Size/MD5: 44598 ead4831ac6771ffa450843eda8de8b6f
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-5ubuntu0.3.dsc
Size/MD5: 760 8917c4b8af6d1a2a312432fcd3ed3595
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz
Size/MD5: 1926538 985e9f6d531ac0b2004f5cbebdeea87d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.3_amd64.deb
Size/MD5: 117936 1c8f6379000640b38056d7857f52e2d5
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.3_amd64.deb
Size/MD5: 68660 e8439e9a1ebf81c4ecc1ae296eb6e6cf
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.3_amd64.deb
Size/MD5: 118326 0f611ff7f14b29375998129c7bc7bb3e
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.3_amd64.deb
Size/MD5: 77050 a9bb359d7c1c297507f09dcd31713fc4
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.3_amd64.deb
Size/MD5: 1276834 d96f4842a748f3bdfcb197b84ad31343

i386 architecture (x86 compatible Intel/AMD)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.3_i386.deb
Size/MD5: 108846 01cd944ce5cedf30ea980cad29b0b650
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.3_i386.deb
Size/MD5: 63554 f1a3ee5ec7dc9c4634e05c24ca618e9f
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.3_i386.deb
Size/MD5: 108984 740b8804b55a2250fad6f0e458685f44
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.3_i386.deb
Size/MD5: 70640 fd40bd8686b4c2369e452bf2e3d41cf7
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.3_i386.deb
Size/MD5: 1182728 79baa9294649eb6046aef8e4d5066dd9

powerpc architecture (Apple Macintosh G3/G4/G5)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.3_powerpc.deb
Size/MD5: 123554 e6605bb4b223d8af420bd0f26f509bfc
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.3_powerpc.deb
Size/MD5: 71010 278592a555bc51c000a09aa9f4908212
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.3_powerpc.deb
Size/MD5: 123916 bb79f881171a0418700b5712712b3e61
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.3_powerpc.deb
Size/MD5: 83060 d48ba48403439efeac5df60a2c832efc
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.3_powerpc.deb
Size/MD5: 1522018 25fbe90b2b5cb254320e4f071c3ab9be

Updated packages for Ubuntu 5.04:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu0.3.diff.gz
Size/MD5: 46403 2473ab542348267405e98bf75086311a
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu0.3.dsc
Size/MD5: 755 05ff6fa21964432cd93637a7f59c6f7a
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz
Size/MD5: 1926538 985e9f6d531ac0b2004f5cbebdeea87d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.3_amd64.deb
Size/MD5: 118302 e21601f02d9bc91b8a5bd33e16057e62
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.3_amd64.deb
Size/MD5: 69062 3bc568b6182ae3dcbc207d29c5207ec6
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.3_amd64.deb
Size/MD5: 118688 1f9c424488313a30cbac7d7224d1a2d9
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.3_amd64.deb
Size/MD5: 77408 dec047ea83819ba0211d04cbadb92e4b
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.3_amd64.deb
Size/MD5: 1277814 b10eb7d5065bb20521402f7c2717da1f

i386 architecture (x86 compatible Intel/AMD)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.3_i386.deb
Size/MD5: 109238 9a002099166088d06b80b5cd49f6dd3f
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.3_i386.deb
Size/MD5: 64042 e00251fbdbfcd0f80601467587b9b351
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.3_i386.deb
Size/MD5: 109360 23a0de8dc9b91c2630c86c8e7a4fa761
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.3_i386.deb
Size/MD5: 70996 ee6837233c551f7debb5005cf50d1269
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.3_i386.deb
Size/MD5: 1175376 0d3ce2fc556bed204e96cb2fe5b2b7ad

powerpc architecture (Apple Macintosh G3/G4/G5)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.3_powerpc.deb
Size/MD5: 123798 720500fb26ac19dfdb7c28649f4f05f7
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.3_powerpc.deb
Size/MD5: 71434 0fd1546f624e500d3e9c4536f0f9af7f
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.3_powerpc.deb
Size/MD5: 124178 f20226e6ea263211e923c9a128e29d11
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.3_powerpc.deb
Size/MD5: 83614 b7dd80377a1712f9a60f800a41563cae
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.3_powerpc.deb
Size/MD5: 1521624 8ded6f73e27ba56360b89d62c632cec7

Updated packages for Ubuntu 5.10:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu1.2.dsc
Size/MD5: 685 46d327d6366e42f80fd160bae5c6cccc
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu1.2.tar.gz
Size/MD5: 1968551 8180ba0350e9e82213d14407d9d54062

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu1.2_amd64.deb
Size/MD5: 116992 3ed365bb3649d860c0627f6492b41080
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu1.2_amd64.deb
Size/MD5: 67868 6e3543ad0208c10834f4ef2383bdfb2e
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu1.2_amd64.deb
Size/MD5: 117426 4349d9fc6235396a55c677a21b9ab1f9
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu1.2_amd64.deb
Size/MD5: 76076 e1d13fda9eb8e0971381cd488f5ddad5
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu1.2_amd64.deb
Size/MD5: 1242318 8a4d45754e7bb6ce0964078370bc06de

i386 architecture (x86 compatible Intel/AMD)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu1.2_i386.deb
Size/MD5: 107438 1306c512e533beb7d6db7cc898b3734e
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu1.2_i386.deb
Size/MD5: 61650 e8d8a63ed3b0ccbe6a56fee32fa90f64
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu1.2_i386.deb
Size/MD5: 107638 350bfd8c14c2b1fa81dc6b8d2e9b96e1
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu1.2_i386.deb
Size/MD5: 68324 497f417f9e38a6939b8692dc63d25f5c
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu1.2_i386.deb
Size/MD5: 1160942 4d1a5506904e1854d911484187256ee7

powerpc architecture (Apple Macintosh G3/G4/G5)

https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu1.2_powerpc.deb
Size/MD5: 118564 4672062e32dc60dd07ea7d0e13ebd587
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu1.2_powerpc.deb
Size/MD5: 67760 d8a059493517d1e3e6cda86daddcb814
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu1.2_powerpc.deb
Size/MD5: 118924 965a8a708f1ca929ea158059b088159a
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu1.2_powerpc.deb
Size/MD5: 78716 db0b8a01d8831722012a9518abbbd749
https://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu1.2_powerpc.deb
Size/MD5: 1442638 79ee88edaf92c82e421fca2df32c88ed

--qMm9M+Fa2AknHoGS
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDgg3nDecnbV4Fd/IRAuChAJ4nkRJ/Le1qJF0G4BJiIEDECKGX4gCdHLyA
pkGDI9UgHGIdS3EOjNfKZ8s=
=FT5p
-----END PGP SIGNATURE-----

--qMm9M+Fa2AknHoGS--
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close