file: Integer overflow
Gentoo Linux Security Advisory
||GLSA 200705-25 / file
||May 31, 2007
||June 01, 2007: 02
||x86 ppc hppa
An integer overflow vulnerability has been reported in file allowing for
the user-assisted execution of arbitrary code.
file is a utility that guesses a file format by scanning binary data
Colin Percival from FreeBSD reported that the previous fix for the
file_printf() buffer overflow introduced a new integer overflow.
A remote attacker could entice a user to run the file program on an
overly large file (more than 1Gb) that would trigger an integer
overflow on 32-bit systems, possibly leading to the execution of
arbitrary code with the rights of the user running file.
There is no known workaround at this time.
Since file is a system package, all Gentoo users should upgrade to the
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/file-4.21"