File(1)4.13-命令File_PrintF整数下溢

admin 2023-12-13 11:00:19 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 File(1)4.13-命令File_PrintF整数下溢

CVE编号

CVE-2007-1536

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2007-03-21
漏洞描述
4.20之前的“文件”程序中file_printf函数中的整数下溢允许用户辅助攻击者通过触发基于堆的缓冲区溢出的文件执行任意代码。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc
http://docs.info.apple.com/article.html?artnum=305530
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
http://mx.gw.com/pipermail/file/2007/000161.html
http://openbsd.org/errata40.html
http://secunia.com/advisories/24548
http://secunia.com/advisories/24592
http://secunia.com/advisories/24604
http://secunia.com/advisories/24608
http://secunia.com/advisories/24616
http://secunia.com/advisories/24617
http://secunia.com/advisories/24723
http://secunia.com/advisories/24754
http://secunia.com/advisories/25133
http://secunia.com/advisories/25393
http://secunia.com/advisories/25402
http://secunia.com/advisories/25931
http://secunia.com/advisories/25989
http://secunia.com/advisories/27307
http://secunia.com/advisories/27314
http://secunia.com/advisories/29179
http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc
http://security.gentoo.org/glsa/glsa-200703-26.xml
http://security.gentoo.org/glsa/glsa-200710-19.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackw...
http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm
http://www.debian.org/security/2007/dsa-1274
http://www.kb.cert.org/vuls/id/606700
http://www.mandriva.com/security/advisories?name=MDKSA-2007:067
http://www.novell.com/linux/security/advisories/2007_40_file.html
http://www.novell.com/linux/security/advisories/2007_5_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0124.html
http://www.securityfocus.com/archive/1/477861/100/0/threaded
http://www.securityfocus.com/archive/1/477950/100/0/threaded
http://www.securityfocus.com/bid/23021
http://www.securitytracker.com/id?1017796
http://www.ubuntu.com/usn/usn-439-1
http://www.vupen.com/english/advisories/2007/1040
http://www.vupen.com/english/advisories/2007/1939
https://bugs.gentoo.org/show_bug.cgi?id=171452
https://exchange.xforce.ibmcloud.com/vulnerabilities/36283
https://issues.rpath.com/browse/RPL-1148
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 file file * Up to (including) 4.19
运行在以下环境
系统 debian_10 file * Up to (excluding) 4.20-1
运行在以下环境
系统 debian_11 file * Up to (excluding) 4.20-1
运行在以下环境
系统 debian_12 file * Up to (excluding) 4.20-1
运行在以下环境
系统 debian_3.1 file * Up to (excluding) 4.12-1sarge1
运行在以下环境
系统 debian_4.0 file * Up to (excluding) 4.17-5etch1
运行在以下环境
系统 debian_sid file * Up to (excluding) 4.20-1
运行在以下环境
系统 redhat_5 file * Up to (excluding) 0:4.10-3.EL4.5
运行在以下环境
系统 suse_11 file * Up to (excluding) 4.24-43
阿里云评分 4.2
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 传输被破坏
  • 服务器危害 服务器失陷
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-189 数值错误
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0