Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 268180 - <sys-apps/file-5.02 Execution of arbitrary code (CVE-2009-3930)
Summary: <sys-apps/file-5.02 Execution of arbitrary code (CVE-2009-3930)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://bugs.debian.org/cgi-bin/bugrep...
Whiteboard: ~2 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-05-01 21:10 UTC by Alex Legler (RETIRED)
Modified: 2009-11-12 23:36 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-05-01 21:10:30 UTC
Secunia writes:

A vulnerability has been reported in file, which can be exploited by malicious people to potentially compromise a user's system.

The vulnerability is caused due to a boundary error within the "cdf_read_sat()" function in src/cdf.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted compound document file.

Successful exploitation may allow execution of arbitrary code.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2009-05-02 12:06:07 UTC
This only affects file 5.0 and later.
Comment 2 SpanKY gentoo-dev 2009-05-05 01:02:40 UTC
file-5.02 is now in the tree, and current stable is 4.xx, so no need for GLSA
Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-12 23:36:24 UTC
CVE-2009-3930 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3930):
  Multiple integer overflows in Christos Zoulas file before 5.02 allow
  user-assisted remote attackers to have an unspecified impact via a
  malformed compound document (aka cdf) file that triggers a buffer
  overflow.