An integer overflow vulnerability has been reported in file allowing for the user-assisted execution of arbitrary code.
|Package||sys-apps/file on the x86 ppc hppa architecture|
|Affected versions||< 4.21|
|Unaffected versions||>= 4.21|
file is a utility that guesses a file format by scanning binary data for patterns.
Colin Percival from FreeBSD reported that the previous fix for the file_printf() buffer overflow introduced a new integer overflow.
A remote attacker could entice a user to run the file program on an overly large file (more than 1Gb) that would trigger an integer overflow on 32-bit systems, possibly leading to the execution of arbitrary code with the rights of the user running file.
There is no known workaround at this time.
Since file is a system package, all Gentoo users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/file-4.21"
May 31, 2007
June 01, 2007: 02