CVE-2009-4274

Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
netpbmnetpbm
10.0
netpbmnetpbm
10.1
netpbmnetpbm
10.2
netpbmnetpbm
10.3
netpbmnetpbm
10.4
netpbmnetpbm
10.5
netpbmnetpbm
10.6
netpbmnetpbm
10.7
netpbmnetpbm
10.8
netpbmnetpbm
10.9
netpbmnetpbm
10.10
netpbmnetpbm
10.11
netpbmnetpbm
10.12
netpbmnetpbm
10.13
netpbmnetpbm
10.14
netpbmnetpbm
10.15
netpbmnetpbm
10.16
netpbmnetpbm
10.17
netpbmnetpbm
10.18
netpbmnetpbm
10.19
netpbmnetpbm
10.20
netpbmnetpbm
10.21
netpbmnetpbm
10.22
netpbmnetpbm
10.23
netpbmnetpbm
10.24
netpbmnetpbm
10.25
netpbmnetpbm
10.26
netpbmnetpbm
10.27
netpbmnetpbm
10.28
netpbmnetpbm
10.29
netpbmnetpbm
10.30
netpbmnetpbm
10.31
netpbmnetpbm
10.32
netpbmnetpbm
10.33
netpbmnetpbm
10.34
netpbmnetpbm
10.35.00
netpbmnetpbm
10.35.01
netpbmnetpbm
10.35.02
netpbmnetpbm
10.35.03
netpbmnetpbm
10.35.04
netpbmnetpbm
10.35.05
netpbmnetpbm
10.35.06
netpbmnetpbm
10.35.07
netpbmnetpbm
10.35.08
netpbmnetpbm
10.35.09
netpbmnetpbm
10.35.10
netpbmnetpbm
10.35.11
netpbmnetpbm
10.35.12
netpbmnetpbm
10.35.13
netpbmnetpbm
10.35.14
netpbmnetpbm
10.35.15
netpbmnetpbm
10.35.16
netpbmnetpbm
10.35.17
netpbmnetpbm
10.35.18
netpbmnetpbm
10.35.19
netpbmnetpbm
10.35.20
netpbmnetpbm
10.35.21
netpbmnetpbm
10.35.22
netpbmnetpbm
10.35.23
netpbmnetpbm
10.35.24
netpbmnetpbm
10.35.25
netpbmnetpbm
10.35.26
netpbmnetpbm
10.35.27
netpbmnetpbm
10.35.28
netpbmnetpbm
10.35.29
netpbmnetpbm
10.35.30
netpbmnetpbm
10.35.31
netpbmnetpbm
10.35.32
netpbmnetpbm
10.35.33
netpbmnetpbm
10.35.34
netpbmnetpbm
10.35.35
netpbmnetpbm
10.35.36
netpbmnetpbm
10.35.37
netpbmnetpbm
10.35.38
netpbmnetpbm
10.35.39
netpbmnetpbm
10.35.40
netpbmnetpbm
10.35.41
netpbmnetpbm
10.35.42
netpbmnetpbm
10.35.43
netpbmnetpbm
10.35.44
netpbmnetpbm
10.35.45
netpbmnetpbm
10.35.46
netpbmnetpbm
10.35.47
netpbmnetpbm
10.36.00
netpbmnetpbm
10.37.00
netpbmnetpbm
10.38.00
netpbmnetpbm
10.39.00
netpbmnetpbm
10.40.00
netpbmnetpbm
10.41.00
netpbmnetpbm
10.42.00
netpbmnetpbm
10.43.00
netpbmnetpbm
10.44.00
netpbmnetpbm
10.45.00
netpbmnetpbm
10.46.00
netpbmnetpbm
10.47.00
netpbmnetpbm
10.47.01
netpbmnetpbm
10.47.02
netpbmnetpbm
10.47.03
netpbmnetpbm
10.47.04
netpbmnetpbm
10.47.05
netpbmnetpbm
10.47.06
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
netpbm-free
bullseye
2:10.0-15.4
fixed
bookworm
2:11.01.00-2
fixed
sid
2:11.08.01-1
fixed
trixie
2:11.08.01-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
netpbm-free
lucid
Fixed 2:10.0-12.1ubuntu1
released
karmic
Fixed 2:10.0-12ubuntu1.1
released
jaunty
Fixed 2:10.0-12ubuntu0.9.04.1
released
intrepid
Fixed 2:10.0-12ubuntu0.8.10.1
released
hardy
Fixed 2:10.0-11.1ubuntu0.1
released
dapper
ignored
References