Ubuntu Security Notice USN-665-1 - It was discovered that Netpbm could be made to overrun a buffer when loading certain images. If a user were tricked into opening a specially crafted GIF image, remote attackers could cause a denial of service or execute arbitrary code with user privileges.
9de42ea2239878ba4794554c3445c8885c96292f92a2383c54e988f376a1513e
Debian Security Advisory 1579-1 - A vulnerability was discovered in the GIF reader implementation in netpbm-free, a suite of image manipulation utilities. Insufficient input data validation could allow a maliciously-crafted GIF file to overrun a stack buffer, potentially permitting the execution of arbitrary code.
b8ee4026f4a54007afd888ed6348ed7f0fc7c9728c856c873aa19b2bfae4987a
Debian Security Advisory 1493-2 - An oversight led to the version number of the Debian 4.0 Etch update for advisory DSA 1493-1 being lower than the version in the main archive, making it uninstallable. This update corrects the version number. Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2.
493f28ba29caa0d59ba9a9c9ce7822536278b1a8d064c49e08cf7401edc2eecd
Debian Security Advisory 1493-1 - Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2. Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potentially the execution of arbitrary code. It was discovered that a buffer overflow in IFF ILBM image parsing could result in denial of service and potentially the execution of arbitrary code.
97e4ceaddd215881f911db5d13ec443964b09751d813f7301d9e8eea92e72475
Mandriva Linux Security Advisory - A buffer overflow in the giftopnm utility in netpbm prior to version 10.27 could allow attackers to have an unknown impact via a specially crafted GIF file.
aefbd16a2a6b6ba80d1aa2d4b1550c6064e700048028378b5cd0a8adb2454d31