CVE-2009-4274

CVSS V2 High 7.5 CVSS V3 None
Description
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Overview
  • CVE ID
  • CVE-2009-4274
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2010-02-12T21:30:00
  • Last Modified Date
  • 2023-02-13T01:18:06
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 08:59:36 Added to TrackCVE
2023-02-02 15:02:44 2023-02-02T14:15:17 CVE Modified Date updated
2023-02-02 15:02:45 Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value. CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image header fields Description updated
2023-02-13 03:03:33 2023-02-13T01:18:06 CVE Modified Date updated
2023-02-13 03:03:33 CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image header fields Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value. Description updated