search menu icon-carat-right cmu-wordmark

CERT Coordination Center

file integer overflow vulnerability

Vulnerability Note VU#606700

Original Release Date: 2007-03-26 | Last Revised: 2007-10-16

Overview

The file program contains a vulnerability that may allow an attacker to execute arbitrary code or create a denial-of-service condition.

Description

file is a program for Unix-like operating systems that is used to determine what type of data is contained in a file.

file contains a buffer overflow vulnerability that is caused by an integer overflow in the file_printf function. To trigger the overflow, an attacker would need to convince a user to run a vulnerable version of file on a specially crafted file.

Impact

An attacker may be able to execute arbitrary code with the permissions of the user running the vulnerable version of file or cause the program to crash, creating a denial-of-service condition

Solution

Upgrade
Version 4.20 of file was released to address this issue. Note that operating systems may ship with different versions of the file program. See the systems affected portion of this document for information about specific vendors.


Do not run file as root

Running the file program with a limited user account may partially mitigate the impact of successful exploitation of vulnerability.

Vendor Information

606700
 

View all 42 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Jean-Sstien Guay-Leroux and Christos Zoulas for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-1536
Severity Metric: 1.62
Date Public: 2007-03-19
Date First Published: 2007-03-26
Date Last Updated: 2007-10-16 12:29 UTC
Document Revision: 44

Sponsored by CISA.