{"id":"CVE-2005-2471","details":"pstopnm in netpbm does not properly use the \"-dSAFER\" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.","modified":"2026-04-10T03:37:09.080157Z","published":"2005-08-05T04:00:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/16184"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18330"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19436"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1021"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2005_19_sr.html"},{"type":"ADVISORY","url":"http://www.trustix.org/errata/2005/0038/"},{"type":"WEB","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757"},{"type":"WEB","url":"http://securitytracker.com/id?1014752"},{"type":"WEB","url":"http://www.osvdb.org/18253"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2005-743.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/14379"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21500"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645"}],"schema_version":"1.7.5"}