Medium: file

2014-09-19T15:57:00
ID ALAS-2014-382
Type amazon
Reporter Amazon
Modified 2014-09-19T15:57:00

Description

Issue Overview:

A denial of service flaw was found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file.

Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.

file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule.

NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345 __.

Affected Packages:

file

Issue Correction:
Run yum update file to update your system.

New Packages:

i686:  
    file-devel-5.19-1.18.amzn1.i686  
    file-5.19-1.18.amzn1.i686  
    file-static-5.19-1.18.amzn1.i686  
    file-debuginfo-5.19-1.18.amzn1.i686  
    file-libs-5.19-1.18.amzn1.i686

noarch:  
    python-magic-5.19-1.18.amzn1.noarch

src:  
    file-5.19-1.18.amzn1.src

x86_64:  
    file-5.19-1.18.amzn1.x86_64  
    file-devel-5.19-1.18.amzn1.x86_64  
    file-libs-5.19-1.18.amzn1.x86_64  
    file-debuginfo-5.19-1.18.amzn1.x86_64  
    file-static-5.19-1.18.amzn1.x86_64