Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2005:133: netpbm Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the netpbm package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2005:133 (netpbm).
Max Vozeler discovered that pstopnm, a part of the netpbm graphics utility
suite, would call the GhostScript interpreter on untrusted PostScript files
without using the -dSAFER option when converting a PostScript file into a PBM,
PGM, or PNM file. This could result in the execution of arbitrary commands with
the rights of the user running pstopnm if they could be convinced to try to
convert a malicious PostScript file.
The updated packages have been patched to correct this problem.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:133
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.