Lucene search

K

[SECURITY] [DSA 1274-1] New file packages fix arbitrary code execution

🗓️ 02 Apr 2007 12:57:10Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 24 Views

Package file has buffer overflow vulnerability allowing arbitrary code execution. Upgrades available for sarge, etch, and sid distributions

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3.1sparcfile4.12-1sarge1file_4.12-1sarge1_sparc.deb
Debian4armlibmagic-dev4.17-5etch1libmagic-dev_4.17-5etch1_arm.deb
Debian4alphafile4.17-5etch1file_4.17-5etch1_alpha.deb
Debian4s390libmagic14.17-5etch1libmagic1_4.17-5etch1_s390.deb
Debian3.1i386file4.12-1sarge1file_4.12-1sarge1_i386.deb
Debian3.1mipselfile4.12-1sarge1file_4.12-1sarge1_mipsel.deb
Debian4ia64libmagic14.17-5etch1libmagic1_4.17-5etch1_ia64.deb
Debian4i386libmagic14.17-5etch1libmagic1_4.17-5etch1_i386.deb
Debian3.1s390file4.12-1sarge1file_4.12-1sarge1_s390.deb
Debian3.1amd64libmagic14.12-1sarge1libmagic1_4.12-1sarge1_amd64.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 Apr 2007 12:10Current
6.8Medium risk
Vulners AI Score6.8
CVSS29.3
EPSS0.13913
24
.json
Report