The pm_mallocarray2 function in lib/util/mallocvar.c in Netpbm through 10.81.03 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, as demonstrated by pbmmask.
Max CVSS
5.5
EPSS Score
0.56%
Published
2018-03-25
Updated
2021-02-04
tiffttopnm in netpbm 10.47.63 does not properly use the libtiff TIFFRGBAImageGet function, which allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted tiff image file, related to transposing width and height values.
Max CVSS
5.5
EPSS Score
0.21%
Published
2017-03-15
Updated
2017-04-07
A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
Max CVSS
5.5
EPSS Score
0.06%
Published
2018-07-27
Updated
2019-10-09
A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
Max CVSS
5.5
EPSS Score
0.06%
Published
2018-07-27
Updated
2019-10-09
An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
Max CVSS
7.8
EPSS Score
0.08%
Published
2018-07-27
Updated
2019-10-09
An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
Max CVSS
7.8
EPSS Score
0.14%
Published
2018-07-27
Updated
2019-06-24
An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.
Max CVSS
7.8
EPSS Score
0.14%
Published
2018-07-27
Updated
2019-06-24
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!