|Main Archive Page > Month Archives > full-disclosure-uk archives|
An integer overflow vulnerability has been reported in file allowing for the user-assisted execution of arbitrary code.
file is a utility that guesses a file format by scanning binary data for patterns.
Colin Percival from FreeBSD reported that the previous fix for the file_printf() buffer overflow introduced a new integer overflow.
A remote attacker could entice a user to run the file program on an overly large file (more than 1Gb) that would trigger an integer overflow on 32-bit systems, possibly leading to the execution of arbitrary code with the rights of the user running file.
There is no known workaround at this time.
Since file is a system package, all Gentoo users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/file-4.21"
[ 1 ] CVE-2007-2799
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to firstname.lastname@example.org or alternatively, you may file a bug at http://bugs.gentoo.org.
Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.