[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-2799

Date: (C)2007-05-23   (M)2017-10-12
 
CVSS Score: 5.1Access Vector: NETWORK
Exploitability Subscore: 4.9Access Complexity: HIGH
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

Reference:
SECTRACK-1018140
2007-0024
http://www.securityfocus.com/archive/1/archive/1/469520/30/6420/threaded
BID-24146
SECUNIA-25394
SECUNIA-25544
SECUNIA-25578
SECUNIA-25931
SECUNIA-26203
SECUNIA-26294
SECUNIA-26415
SECUNIA-29179
SECUNIA-29420
OSVDB-38498
ADV-2007-2071
ADV-2008-0924
APPLE-SA-2008-03-18
DSA-1343
GLSA-200705-25
MDKSA-2007:114
NetBSD-SA2008-001
RHSA-2007:0391
SUSE-SA:2007:040
USN-439-2
file-assert-code-execution(34731)
http://docs.info.apple.com/article.html?artnum=307562
http://support.avaya.com/elmodocs2/security/ASA-2007-290.htm
http://www.amavis.org/security/asa-2007-3.txt
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=241022
https://issues.rpath.com/browse/RPL-1311

CWE    1
CWE-189

© 2013 SecPod Technologies