[原文]Integer overflow in the readpgm function in pnm.c for GOCR 0.40, when using the netpbm library, allows remote attackers to execute arbitrary code via a PNM file with large width and height values, which leads to a heap-based buffer overflow.
GOCR PNM File Processing readpgm() Function Overflow
Local Access Required
Loss of Integrity
A local overflow exists in GOCR. The 'readpgm()' function fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted PNM file either when using the netpbm library or not, a malicious user can cause arbitrary code execution resulting in a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.