Mandriva Linux Security Advisory 2010-039 – Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/86426/MDVSA-2010-039.txt
Source: https://packetstormsecurity.com/files/86426/Mandriva-Linux-Security-Advisory-2010-039.html

