blob: d20e9a88b21438e899727a6dc18305f37536977c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200412-07">
<title>file: Arbitrary code execution</title>
The code for parsing ELF headers in file contains a flaw which may allow an
attacker to execute arbitrary code.
<product type="ebuild">file</product>
<announced>December 13, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="sys-apps/file" auto="yes" arch="*">
<unaffected range="ge">4.12</unaffected>
<vulnerable range="lt">4.12</vulnerable>
file is a utility used to identify the type of a file.
A possible stack overflow has been found in the ELF header parsing code
of file.
<impact type="normal">
An attacker may be able to create a specially crafted ELF file which,
when processed with file, may allow the execution of arbitrary code.
There is no known workaround at this time.
All file users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.12&quot;</code>
<uri link="">SecurityTracker Alert ID 1012433</uri>
<uri link="">CVE-2004-1304</uri>
<metadata tag="requester" timestamp="Sat, 11 Dec 2004 10:27:20 +0000">
<metadata tag="bugReady" timestamp="Sat, 11 Dec 2004 10:27:27 +0000">
<metadata tag="submitter" timestamp="Sun, 12 Dec 2004 20:24:04 +0000">