Vulnerability Description
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| File | File | <= 4.19 |
Related Weaknesses (CWE)
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc
- http://docs.info.apple.com/article.html?artnum=305530
- http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
- http://mx.gw.com/pipermail/file/2007/000161.htmlPatch
- http://openbsd.org/errata40.html#015_file
- http://secunia.com/advisories/24548PatchVendor Advisory
- http://secunia.com/advisories/24592Vendor Advisory
- http://secunia.com/advisories/24604Vendor Advisory
- http://secunia.com/advisories/24608Vendor Advisory
- http://secunia.com/advisories/24616Vendor Advisory
- http://secunia.com/advisories/24617Vendor Advisory
- http://secunia.com/advisories/24723Vendor Advisory
- http://secunia.com/advisories/24754Vendor Advisory
- http://secunia.com/advisories/25133Vendor Advisory
- http://secunia.com/advisories/25393Vendor Advisory
FAQ
What is CVE-2007-1536?
CVE-2007-1536 is a vulnerability with a CVSS score of 9.3 (HIGH). Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
How severe is CVE-2007-1536?
CVE-2007-1536 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1536?
Check the references section above for vendor advisories and patch information. Affected products include: File File.