GLSA Bodhisattva


Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Mon Dec 13, 2004 11:39 pm Post subject: [ GLSA 200412-07 ] file: Arbitrary code execution |
|
|
Gentoo Linux Security Advisory
Title: file: Arbitrary code execution (GLSA 200412-07)
Severity: normal
Exploitable: remote
Date: December 13, 2004
Updated: May 22, 2006
Bug(s): #72521
ID: 200412-07
Synopsis
The code for parsing ELF headers in file contains a flaw which may allow an
attacker to execute arbitrary code.
Background
file is a utility used to identify the type of a file.
Affected Packages
Package: sys-apps/file
Vulnerable: < 4.12
Unaffected: >= 4.12
Architectures: All supported architectures
Description
A possible stack overflow has been found in the ELF header parsing code
of file.
Impact
An attacker may be able to create a specially crafted ELF file which,
when processed with file, may allow the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All file users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/file-4.12" |
References
SecurityTracker Alert ID 1012433
CVE-2004-1304
Last edited by GLSA on Tue Sep 25, 2012 4:18 am; edited 6 times in total |
|