An integer overflow vulnerability has been reported in file allowing for the user-assisted execution of arbitrary code.
Package | sys-apps/file on the x86 ppc hppa architecture |
---|---|
Affected versions | < 4.21 |
Unaffected versions | >= 4.21 |
file is a utility that guesses a file format by scanning binary data for patterns.
Colin Percival from FreeBSD reported that the previous fix for the file_printf() buffer overflow introduced a new integer overflow.
A remote attacker could entice a user to run the file program on an overly large file (more than 1Gb) that would trigger an integer overflow on 32-bit systems, possibly leading to the execution of arbitrary code with the rights of the user running file.
There is no known workaround at this time.
Since file is a system package, all Gentoo users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/file-4.21"
Release date
May 31, 2007
Latest revision
June 01, 2007: 02
Severity
high
Exploitable
remote
Bugzilla entries