Lucene search

K
osvGoogleOSV:DLA-131-1
HistoryJan 09, 2015 - 12:00 a.m.

file - security update

2015-01-0900:00:00
Google
osv.dev
9

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.032 Low

EPSS

Percentile

89.8%

Multiple security issues have been found in file, a tool/library to
determine a file type. Processing a malformed file could result in
denial of service. Most of the changes are related to parsing ELF
files.

As part of the fixes, several limits on aspects of the detection were
added or tightened, sometimes resulting in messages like recursion
limit exceeded or too many program header sections.

To mitigate such shortcomings, these limits are controllable by a new
“-R”/“–recursion” parameter in the file program. Note: A future
upgrade for file in squeeze-lts might replace this with the “-P”
parameter to keep usage consistent across all distributions.

  • CVE-2014-8116
    The ELF parser (readelf.c) allows remote attackers to cause a
    denial of service (CPU consumption or crash).
  • CVE-2014-8117
    softmagic.c does not properly limit recursion, which allows remote
    attackers to cause a denial of service (CPU consumption or crash).

(no identifier has been assigned so far)

out-of-bounds memory access

For Debian 6 Squeeze, these issues have been fixed in file version 5.04-5+squeeze9

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.032 Low

EPSS

Percentile

89.8%