Bug 546580 (CVE-2009-4274) - CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image header fields
Summary: CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap imag...
Alias: CVE-2009-4274
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 563288 567597 760848 760849 760850
Blocks: 580448
TreeView+ depends on / blocked
Reported: 2009-12-11 09:57 UTC by Jan Lieskovsky
Modified: 2021-02-25 01:57 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 567597 (view as bug list)
Last Closed: 2011-12-13 07:51:56 UTC

Attachments (Terms of Use)
Proposed patch (489 bytes, patch)
2009-12-11 18:09 UTC, Jindrich Novy
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1811 0 normal SHIPPED_LIVE Important: netpbm security update 2011-12-13 02:06:54 UTC

Description Jan Lieskovsky 2009-12-11 09:57:58 UTC
Marc Schoenefeld found a stack-based buffer overflow in
the way netpbm graphics file formats handling library used
to process content of header fields of the X PixMap (XPM)
image file. A remote attacker could provide a specially-crafted
XPM image file and trick the local user into processing it,
which would lead to denial of service (crash of application
using the netpbm library) or, potentially, to execution of
arbitrary code with the privileges of that application.

Comment 3 Jan Lieskovsky 2009-12-11 10:27:45 UTC
This issue affects the versions of the netpbm package, as shipped with
Red Hat Enterprise Linux 3, 4, and 5.

This issue affects the versions of the netpbm package, as shipped with
Fedora release of 10, 11, and 12.

Comment 5 Jindrich Novy 2009-12-11 18:09:49 UTC
Created attachment 377777 [details]
Proposed patch

I have inspected the code and it looks like a next of the upstream thinko series. The attached patch should fix it.

Comment 6 Josh Bressers 2009-12-17 20:55:02 UTC

I'd like to send this patch upstream, do you have a contact? I'm not interested in an embargo, but I don't want to make this public until they have a chance to apply the patch.


Comment 8 Vincent Danen 2010-02-09 03:03:05 UTC
This was corrected upstream in 10.47.07 on 20091229:


The upstream changelog contains:

xpmtoppm: fix wild pointer with color index > 127.

so it is unclear whether they were aware of the security implications of this issue.

I have assigned CVE-2009-4274 to this issue.

Comment 12 Vincent Danen 2010-02-09 18:03:00 UTC
Notified the oss-security mailing list.

Comment 17 errata-xmlrpc 2011-12-12 21:08:30 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2011:1811 https://rhn.redhat.com/errata/RHSA-2011-1811.html

Comment 18 Vincent Danen 2011-12-13 15:50:49 UTC


Note You need to log in before you can comment on or make changes to this bug.