Lucene search

K
mageiaGentoo FoundationMGASA-2014-0142
HistoryMar 31, 2014 - 11:34 p.m.

Updated file packages fix security vulnerabilities

2014-03-3123:34:34
Gentoo Foundation
advisories.mageia.org
27

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.004

Percentile

74.8%

The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters (CVE-2013-7345).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfile< 5.12-8.3file-5.12-8.3.mga3

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.004

Percentile

74.8%