Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:133: netpbm Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the netpbm package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:133 (netpbm).

Max Vozeler discovered that pstopnm, a part of the netpbm graphics utility
suite, would call the GhostScript interpreter on untrusted PostScript files
without using the -dSAFER option when converting a PostScript file into a PBM,
PGM, or PNM file. This could result in the execution of arbitrary commands with
the rights of the user running pstopnm if they could be convinced to try to
convert a malicious PostScript file.

The updated packages have been patched to correct this problem.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.