ID |
CVE-2007-1536
|
Summary |
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 9.3 (as of 16-10-2018 - 16:38) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
oval
via4
|
accepted | 2013-04-29T04:07:29.970-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | family | unix | id | oval:org.mitre.oval:def:10658 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | version | 30 |
|
redhat
via4
|
advisories | bugzilla | id | 233164 | title | CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 4 is installed | oval | oval:com.redhat.rhba:tst:20070304025 |
comment | file is earlier than 0:4.10-3.EL4.5 | oval | oval:com.redhat.rhsa:tst:20070124001 |
comment | file is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20070124002 |
|
AND | comment | Red Hat Enterprise Linux 5 is installed | oval | oval:com.redhat.rhba:tst:20070331005 |
comment | file is earlier than 0:4.17-9.el5 | oval | oval:com.redhat.rhsa:tst:20070124004 |
comment | file is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070124005 |
|
|
| rhsa | id | RHSA-2007:0124 | released | 2007-03-23 | severity | Moderate | title | RHSA-2007:0124: file security update (Moderate) |
|
| rpms | - file-0:4.10-3.EL4.5
- file-0:4.17-9.el5
- file-debuginfo-0:4.10-3.EL4.5
- file-debuginfo-0:4.17-9.el5
|
|
refmap
via4
|
apple | APPLE-SA-2007-05-24 | bid | 23021 | bugtraq | - 20070825 OpenBSD 4.1 - Heap overflow vulnerabillity
- 20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity
| cert-vn | VU#606700 | confirm | | debian | DSA-1274 | freebsd | FreeBSD-SA-07:04 | gentoo | - GLSA-200703-26
- GLSA-200710-19
| mandriva | MDKSA-2007:067 | mlist | [file] 20070302 file-4.20 is now available | netbsd | NetBSD-SA2008-001 | openbsd | [4.0] 20070709 015: SECURITY FIX: July 9, 2007 | sectrack | 1017796 | secunia | - 24548
- 24592
- 24604
- 24608
- 24616
- 24617
- 24723
- 24754
- 25133
- 25393
- 25402
- 25931
- 25989
- 27307
- 27314
- 29179
| slackware | SSA:2007-093-01 | suse | - SUSE-SA:2007:040
- SUSE-SR:2007:005
| ubuntu | USN-439-1 | vupen | - ADV-2007-1040
- ADV-2007-1939
| xf | openbsd-file-bo(36283) |
|
Last major update |
16-10-2018 - 16:38 |
Published |
20-03-2007 - 20:19 |
Last modified |
16-10-2018 - 16:38 |