Package: file
Version: 4.12-1, 4.17-5
Severity: grave
Justification: user security hole
Tags: security, patch, etch, sarge

>From http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536:

Integer underflow in the file_printf function in the "file" program
before 4.20 allows user-assisted attackers to execute arbitrary code
via a file that triggers a heap-based buffer overflow.

Patch from RedHat/Ubuntu:
http://bugzilla.redhat.com/bugzilla/attachment.cgi?id=150541

Sorry, I wasn't able to test it, since I haven't found any PoC exploit
yet, but since the bug was announced this year (Changelog for 4.20)
and the last uploads for Sarge and Etch were last year or earlier, I
assume that the bug is in Sarge as well as in Etch. Sid already has
upstream version 4.20 which is fixed.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.4.33.2-1-dphys-k8-smp-64gb
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages file depends on:
ii  libc6                 2.3.2.ds1-22sarge5 GNU C Library: Shared libraries an
ii  libmagic1             4.12-1             File type determination library us
ii  zlib1g                1:1.2.2-4.sarge.2  compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to