Joined: 12 May 2004
|Posted: Thu May 31, 2007 8:26 pm Post subject: [ GLSA 200705-25 ] file: Integer overflow
|Gentoo Linux Security Advisory
Title: file: Integer overflow (GLSA 200705-25)
Date: May 31, 2007
Updated: June 01, 2007
An integer overflow vulnerability has been reported in file allowing for
the user-assisted execution of arbitrary code.
file is a utility that guesses a file format by scanning binary data
Vulnerable: < 4.21
Unaffected: >= 4.21
Architectures: x86 ppc hppa
Colin Percival from FreeBSD reported that the previous fix for the
file_printf() buffer overflow introduced a new integer overflow.
A remote attacker could entice a user to run the file program on an
overly large file (more than 1Gb) that would trigger an integer
overflow on 32-bit systems, possibly leading to the execution of
arbitrary code with the rights of the user running file.
There is no known workaround at this time.
Since file is a system package, all Gentoo users should upgrade to the
|# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/file-4.21"
Last edited by GLSA on Sun Oct 25, 2009 4:24 am; edited 3 times in total