CVE-2009-4274

EUVD-2009-4242
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
netpbmnetpbm
10.0
netpbmnetpbm
10.1
netpbmnetpbm
10.2
netpbmnetpbm
10.3
netpbmnetpbm
10.4
netpbmnetpbm
10.5
netpbmnetpbm
10.6
netpbmnetpbm
10.7
netpbmnetpbm
10.8
netpbmnetpbm
10.9
netpbmnetpbm
10.10
netpbmnetpbm
10.11
netpbmnetpbm
10.12
netpbmnetpbm
10.13
netpbmnetpbm
10.14
netpbmnetpbm
10.15
netpbmnetpbm
10.16
netpbmnetpbm
10.17
netpbmnetpbm
10.18
netpbmnetpbm
10.19
netpbmnetpbm
10.20
netpbmnetpbm
10.21
netpbmnetpbm
10.22
netpbmnetpbm
10.23
netpbmnetpbm
10.24
netpbmnetpbm
10.25
netpbmnetpbm
10.26
netpbmnetpbm
10.27
netpbmnetpbm
10.28
netpbmnetpbm
10.29
netpbmnetpbm
10.30
netpbmnetpbm
10.31
netpbmnetpbm
10.32
netpbmnetpbm
10.33
netpbmnetpbm
10.34
netpbmnetpbm
10.35.00
netpbmnetpbm
10.35.01
netpbmnetpbm
10.35.02
netpbmnetpbm
10.35.03
netpbmnetpbm
10.35.04
netpbmnetpbm
10.35.05
netpbmnetpbm
10.35.06
netpbmnetpbm
10.35.07
netpbmnetpbm
10.35.08
netpbmnetpbm
10.35.09
netpbmnetpbm
10.35.10
netpbmnetpbm
10.35.11
netpbmnetpbm
10.35.12
netpbmnetpbm
10.35.13
netpbmnetpbm
10.35.14
netpbmnetpbm
10.35.15
netpbmnetpbm
10.35.16
netpbmnetpbm
10.35.17
netpbmnetpbm
10.35.18
netpbmnetpbm
10.35.19
netpbmnetpbm
10.35.20
netpbmnetpbm
10.35.21
netpbmnetpbm
10.35.22
netpbmnetpbm
10.35.23
netpbmnetpbm
10.35.24
netpbmnetpbm
10.35.25
netpbmnetpbm
10.35.26
netpbmnetpbm
10.35.27
netpbmnetpbm
10.35.28
netpbmnetpbm
10.35.29
netpbmnetpbm
10.35.30
netpbmnetpbm
10.35.31
netpbmnetpbm
10.35.32
netpbmnetpbm
10.35.33
netpbmnetpbm
10.35.34
netpbmnetpbm
10.35.35
netpbmnetpbm
10.35.36
netpbmnetpbm
10.35.37
netpbmnetpbm
10.35.38
netpbmnetpbm
10.35.39
netpbmnetpbm
10.35.40
netpbmnetpbm
10.35.41
netpbmnetpbm
10.35.42
netpbmnetpbm
10.35.43
netpbmnetpbm
10.35.44
netpbmnetpbm
10.35.45
netpbmnetpbm
10.35.46
netpbmnetpbm
10.35.47
netpbmnetpbm
10.36.00
netpbmnetpbm
10.37.00
netpbmnetpbm
10.38.00
netpbmnetpbm
10.39.00
netpbmnetpbm
10.40.00
netpbmnetpbm
10.41.00
netpbmnetpbm
10.42.00
netpbmnetpbm
10.43.00
netpbmnetpbm
10.44.00
netpbmnetpbm
10.45.00
netpbmnetpbm
10.46.00
netpbmnetpbm
10.47.00
netpbmnetpbm
10.47.01
netpbmnetpbm
10.47.02
netpbmnetpbm
10.47.03
netpbmnetpbm
10.47.04
netpbmnetpbm
10.47.05
netpbmnetpbm
10.47.06
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
netpbm-free
bookworm
2:11.01.00-2
fixed
bullseye
2:10.0-15.4
fixed
sid
2:11.08.01-1
fixed
trixie
2:11.08.01-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
netpbm-free
dapper
ignored
hardy
Fixed 2:10.0-11.1ubuntu0.1
released
intrepid
Fixed 2:10.0-12ubuntu0.8.10.1
released
jaunty
Fixed 2:10.0-12ubuntu0.9.04.1
released
karmic
Fixed 2:10.0-12ubuntu1.1
released
lucid
Fixed 2:10.0-12.1ubuntu1
released
References