Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-1536 (GCVE-0-2007-1536)
Vulnerability from cvelistv5 – Published: 2007-03-20 20:00 – Updated: 2024-08-07 12:59- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:08.440Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "27314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27314"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "25393",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25393"
},
{
"name": "29179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29179"
},
{
"name": "ADV-2007-1939",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "23021",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/23021"
},
{
"name": "24616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24616"
},
{
"name": "1017796",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017796"
},
{
"name": "[4.0] 20070709 015: SECURITY FIX: July 9, 2007",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD",
"x_transferred"
],
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"name": "27307",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27307"
},
{
"name": "[file] 20070302 file-4.20 is now available",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"name": "MDKSA-2007:067",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"name": "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"name": "SUSE-SR:2007:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"name": "24723",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24723"
},
{
"name": "24754",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24754"
},
{
"name": "APPLE-SA-2007-05-24",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "25402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "RHSA-2007:0124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"name": "25989",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25989"
},
{
"name": "24604",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24604"
},
{
"name": "oval:org.mitre.oval:def:10658",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"name": "SUSE-SA:2007:040",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"name": "25931",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25931"
},
{
"name": "DSA-1274",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"name": "24617",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24617"
},
{
"name": "openbsd-file-bo(36283)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"name": "ADV-2007-1040",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"name": "25133",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25133"
},
{
"name": "FreeBSD-SA-07:04",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"name": "USN-439-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"name": "NetBSD-SA2008-001",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD",
"x_transferred"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"name": "VU#606700",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"name": "24608",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24608"
},
{
"name": "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"name": "GLSA-200703-26",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"name": "GLSA-200710-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"name": "24548",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24548"
},
{
"name": "24592",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24592"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"name": "SSA:2007-093-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "27314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27314"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "25393",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25393"
},
{
"name": "29179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29179"
},
{
"name": "ADV-2007-1939",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "23021",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/23021"
},
{
"name": "24616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24616"
},
{
"name": "1017796",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017796"
},
{
"name": "[4.0] 20070709 015: SECURITY FIX: July 9, 2007",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD"
],
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"name": "27307",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27307"
},
{
"name": "[file] 20070302 file-4.20 is now available",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"name": "MDKSA-2007:067",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"name": "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"name": "SUSE-SR:2007:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"name": "24723",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24723"
},
{
"name": "24754",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24754"
},
{
"name": "APPLE-SA-2007-05-24",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "25402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "RHSA-2007:0124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"name": "25989",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25989"
},
{
"name": "24604",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24604"
},
{
"name": "oval:org.mitre.oval:def:10658",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"name": "SUSE-SA:2007:040",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"name": "25931",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25931"
},
{
"name": "DSA-1274",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"name": "24617",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24617"
},
{
"name": "openbsd-file-bo(36283)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"name": "ADV-2007-1040",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"name": "25133",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25133"
},
{
"name": "FreeBSD-SA-07:04",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"name": "USN-439-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"name": "NetBSD-SA2008-001",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"name": "VU#606700",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"name": "24608",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24608"
},
{
"name": "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"name": "GLSA-200703-26",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"name": "GLSA-200710-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"name": "24548",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24548"
},
{
"name": "24592",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24592"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"name": "SSA:2007-093-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1536",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27314"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "25393",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25393"
},
{
"name": "29179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29179"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "23021",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23021"
},
{
"name": "24616",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24616"
},
{
"name": "1017796",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017796"
},
{
"name": "[4.0] 20070709 015: SECURITY FIX: July 9, 2007",
"refsource": "OPENBSD",
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"name": "27307",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27307"
},
{
"name": "[file] 20070302 file-4.20 is now available",
"refsource": "MLIST",
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"name": "MDKSA-2007:067",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"name": "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"name": "SUSE-SR:2007:005",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"name": "24723",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24723"
},
{
"name": "24754",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24754"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "25402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25402"
},
{
"name": "RHSA-2007:0124",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=171452",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"name": "25989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25989"
},
{
"name": "24604",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24604"
},
{
"name": "oval:org.mitre.oval:def:10658",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"name": "SUSE-SA:2007:040",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"name": "25931",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25931"
},
{
"name": "DSA-1274",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"name": "24617",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24617"
},
{
"name": "openbsd-file-bo(36283)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"name": "ADV-2007-1040",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"name": "25133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25133"
},
{
"name": "FreeBSD-SA-07:04",
"refsource": "FREEBSD",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"name": "USN-439-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"name": "NetBSD-SA2008-001",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"name": "VU#606700",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"name": "24608",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24608"
},
{
"name": "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"name": "GLSA-200703-26",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"name": "GLSA-200710-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"name": "24548",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24548"
},
{
"name": "24592",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24592"
},
{
"name": "https://issues.rpath.com/browse/RPL-1148",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"name": "SSA:2007-093-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1536",
"datePublished": "2007-03-20T20:00:00.000Z",
"dateReserved": "2007-03-20T00:00:00.000Z",
"dateUpdated": "2024-08-07T12:59:08.440Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-1536",
"date": "2026-05-16",
"epss": "0.41927",
"percentile": "0.97473"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:file:file:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.19\", \"matchCriteriaId\": \"7DDA4B95-1EEE-4EF9-8155-DDC349952C24\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer underflow in the file_printf function in the \\\"file\\\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.\"}, {\"lang\": \"es\", \"value\": \"Un subdesbordamiento de enteros en la funci\\u00f3n file_printf en el programa \\\"file\\\" anterior a versi\\u00f3n 4.20, permite a los atacantes asistidos por el usuario ejecutar c\\u00f3digo arbitrario por medio de un archivo que desencadena un desbordamiento de b\\u00fafer en la regi\\u00f3n heap de la memoria.\"}]",
"id": "CVE-2007-1536",
"lastModified": "2024-11-21T00:28:33.540",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2007-03-20T20:19:00.000",
"references": "[{\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=305530\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://mx.gw.com/pipermail/file/2007/000161.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://openbsd.org/errata40.html#015_file\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24548\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24592\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24604\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24608\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24616\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24617\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24723\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24754\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25133\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25393\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25402\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25931\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25989\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27307\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27314\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29179\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200703-26.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200710-19.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1274\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/606700\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_40_file.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_5_sr.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0124.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/477861/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/477950/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/23021\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1017796\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-439-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1040\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1939\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.gentoo.org/show_bug.cgi?id=171452\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1148\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658\", \"source\": \"cve@mitre.org\"}, {\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=305530\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://mx.gw.com/pipermail/file/2007/000161.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://openbsd.org/errata40.html#015_file\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24548\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24592\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24604\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24608\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24616\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24617\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24723\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/24754\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25393\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25402\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25931\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25989\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27307\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/27314\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29179\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200703-26.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200710-19.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1274\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/606700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_40_file.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_5_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0124.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/477861/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/477950/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/23021\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1017796\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-439-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1040\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1939\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.gentoo.org/show_bug.cgi?id=171452\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1148\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-1536\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-03-20T20:19:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer underflow in the file_printf function in the \\\"file\\\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Un subdesbordamiento de enteros en la funci\u00f3n file_printf en el programa \\\"file\\\" anterior a versi\u00f3n 4.20, permite a los atacantes asistidos por el usuario ejecutar c\u00f3digo arbitrario por medio de un archivo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:file:file:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.19\",\"matchCriteriaId\":\"7DDA4B95-1EEE-4EF9-8155-DDC349952C24\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://mx.gw.com/pipermail/file/2007/000161.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://openbsd.org/errata40.html#015_file\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24548\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24592\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24604\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24608\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24616\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24617\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24723\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24754\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25133\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25393\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25402\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25931\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27307\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27314\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29179\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200703-26.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-19.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1274\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/606700\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_40_file.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_5_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0124.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/477861/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/477950/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/23021\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017796\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-439-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1040\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1939\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.gentoo.org/show_bug.cgi?id=171452\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1148\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://mx.gw.com/pipermail/file/2007/000161.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://openbsd.org/errata40.html#015_file\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24548\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24592\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24608\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27307\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200703-26.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-19.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/606700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_40_file.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_5_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0124.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/477861/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/477950/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/23021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1017796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-439-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.gentoo.org/show_bug.cgi?id=171452\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-138
Vulnerability from certfr_avis - Published: - Updated:None
Description
Une vulnérabilité de type débordement d'entier dans la fonction file_printf du programme file permet à une personne malintentionnée d'exécuter du code arbitraire à distance avec les droits de l'utilisateur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
file versions antérieures à 4.20.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cTT\u003efile\u003c/TT\u003e versions ant\u00e9rieures \u00e0 4.20.\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier dans la fonction\nfile_printf du programme file permet \u00e0 une personne malintentionn\u00e9e\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec les droits de\nl\u0027utilisateur.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2799"
},
{
"name": "CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1274-1 du 02 avril 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1343-1 du 31 juillet 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1343"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:067 du 22 mars 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007-0391-3 du 30 mai 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0391.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD-SA-07:04 du 23 mai 2007 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:005 du 30 mars 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-179 du 04 mai 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200703-26 du 30 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-26.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007-0124-2 du 23 mars 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0124.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-439-1 du 21 mars 2007 :",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-25 du 31 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-25.xml"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 de file 4.20 du 02 mars 2007 :",
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
}
],
"reference": "CERTA-2007-AVI-138",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-26T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences Debian, Mandriva, SuSE, Gentoo, Avaya, Redhat, Ubuntu.",
"revision_date": "2007-05-07T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2007-05-29T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence CVE et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, RedHat.",
"revision_date": "2007-06-01T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2007-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 dans file",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de file",
"url": null
}
]
}
CERTA-2007-AVI-234
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées : elles concernent le système d'exploitation Mac OS X. L'exploitation de ces dernières peut avoir des conséquences variées, comme l'exécution de code arbitraire, ou un dysfonctionnement du système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Mac OS X. Parmi celles-ci :
- Alias Manager : il existerait, sous certaines conditions, une incohérence sur les noms de fichier lorsque deux images disque sont montées. Cette vulnérabilité pourrait être exploitée pour faire ouvrir et/ou exécuter un fichier différent de celui demandé sur le système vulnérable ;
- BIND : plusieurs vulnérabilités ont été corrigées dans le serveur DNS pour Mac OS X. Elles sont semblables à celles décrites dans les avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;
- CoreGraphics : l'application ne manipulerait pas correctement certains fichiers au format PDF (pour Portable Document Format), pouvant entraîner l'exécution de commande arbitraire à distance ;
- crontabs : le gestionnaire de tâches pourrait perturber le système de fichiers monté dans le répertoire /tmp, par le biais du script de nettoyage journalier.
- fetchmail : une vulnérabilité présente dans fetchmail permettrait de récupérer tout ou partie d'un mot de passe échangé au cours de l'initialisation de la connexion POP3. Cette vulnérabilité est différente de celle décrite dans CERTA-2007-AVI-020.
- file : la commande file ne manipule pas correctement certains fichiers, ce qui peut provoquer l'interruption de la commande, voire l'exécution de code arbitraire sur le système vulnérable.
- iChat : l'application de messagerie instantanée ne gère pas correctement certains paquets UPnP IGD (pour Internet Gateway Device Standardized Device Control Protocol). Une personne malveillante distante peut ainsi exploiter cette vulnérabilité en envoyant un paquet spécialement construit, afin de perturber l'application ou d'exécuter du code arbitraire à distance.
- mDNSResponder : le problème est identique à celui présenté pour iChat mais n'affecterait que les versions au moins équivalentes à Mac OS X v10.4 ;
- PPP : le démon PPP ne chargerait pas correctement certains modules au cours de son lancement en ligne de commandes, ce qui permettrait à une personne malveillante locale d'élever ses privilèges sur le système vulnérable ;
- ruby : les vulnérabilités corrigées ont été présentées dans l'avis CERTA-2006-AVI-562 ;
- screen : le service GNU Screen auraient plusieurs vulnérabilités exploitables par la ligne de commande screen, et qui provoqueraient sous certaines conditions un déni de service.
- texinfo : une vulnérabilité permettrait d'élever ses privilèges à ceux de l'utilisateur utilisant texinfo afin de créer ou d'écraser des fichiers d'accès limité.
- VPN : le démon vpnd ne manipulerait pas correctement certaines chaînes de caractères, permettant à un utilisateur local d'élever ses privilèges à ceux du système et d'exécuter du code arbitraire sur la machine.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Mac OS X Server v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.4.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X Server v10.4.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Mac OS X. Parmi celles-ci :\n\n- Alias Manager : il existerait, sous certaines conditions, une\n incoh\u00e9rence sur les noms de fichier lorsque deux images disque sont\n mont\u00e9es. Cette vuln\u00e9rabilit\u00e9 pourrait \u00eatre exploit\u00e9e pour faire\n ouvrir et/ou ex\u00e9cuter un fichier diff\u00e9rent de celui demand\u00e9 sur le\n syst\u00e8me vuln\u00e9rable ;\n- BIND : plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le serveur\n DNS pour Mac OS X. Elles sont semblables \u00e0 celles d\u00e9crites dans les\n avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;\n- CoreGraphics : l\u0027application ne manipulerait pas correctement\n certains fichiers au format PDF (pour Portable Document Format),\n pouvant entra\u00eener l\u0027ex\u00e9cution de commande arbitraire \u00e0 distance ;\n- crontabs : le gestionnaire de t\u00e2ches pourrait perturber le syst\u00e8me\n de fichiers mont\u00e9 dans le r\u00e9pertoire /tmp, par le biais du script de\n nettoyage journalier.\n- fetchmail : une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans fetchmail permettrait de\n r\u00e9cup\u00e9rer tout ou partie d\u0027un mot de passe \u00e9chang\u00e9 au cours de\n l\u0027initialisation de la connexion POP3. Cette vuln\u00e9rabilit\u00e9 est\n diff\u00e9rente de celle d\u00e9crite dans CERTA-2007-AVI-020.\n- file : la commande file ne manipule pas correctement certains\n fichiers, ce qui peut provoquer l\u0027interruption de la commande, voire\n l\u0027ex\u00e9cution de code arbitraire sur le syst\u00e8me vuln\u00e9rable.\n- iChat : l\u0027application de messagerie instantan\u00e9e ne g\u00e8re pas\n correctement certains paquets UPnP IGD (pour Internet Gateway Device\n Standardized Device Control Protocol). Une personne malveillante\n distante peut ainsi exploiter cette vuln\u00e9rabilit\u00e9 en envoyant un\n paquet sp\u00e9cialement construit, afin de perturber l\u0027application ou\n d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n- mDNSResponder : le probl\u00e8me est identique \u00e0 celui pr\u00e9sent\u00e9 pour\n iChat mais n\u0027affecterait que les versions au moins \u00e9quivalentes \u00e0\n Mac OS X v10.4 ;\n- PPP : le d\u00e9mon PPP ne chargerait pas correctement certains modules\n au cours de son lancement en ligne de commandes, ce qui permettrait\n \u00e0 une personne malveillante locale d\u0027\u00e9lever ses privil\u00e8ges sur le\n syst\u00e8me vuln\u00e9rable ;\n- ruby : les vuln\u00e9rabilit\u00e9s corrig\u00e9es ont \u00e9t\u00e9 pr\u00e9sent\u00e9es dans l\u0027avis\n CERTA-2006-AVI-562 ;\n- screen : le service GNU Screen auraient plusieurs vuln\u00e9rabilit\u00e9s\n exploitables par la ligne de commande screen, et qui provoqueraient\n sous certaines conditions un d\u00e9ni de service.\n- texinfo : une vuln\u00e9rabilit\u00e9 permettrait d\u0027\u00e9lever ses privil\u00e8ges \u00e0\n ceux de l\u0027utilisateur utilisant texinfo afin de cr\u00e9er ou d\u0027\u00e9craser\n des fichiers d\u0027acc\u00e8s limit\u00e9.\n- VPN : le d\u00e9mon vpnd ne manipulerait pas correctement certaines\n cha\u00eenes de caract\u00e8res, permettant \u00e0 un utilisateur local d\u0027\u00e9lever\n ses privil\u00e8ges \u00e0 ceux du syst\u00e8me et d\u0027ex\u00e9cuter du code arbitraire\n sur la machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-5467",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5467"
},
{
"name": "CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"name": "CVE-2006-6303",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6303"
},
{
"name": "CVE-2007-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0751"
},
{
"name": "CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
},
{
"name": "CVE-2007-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0494"
},
{
"name": "CVE-2006-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4096"
},
{
"name": "CVE-2007-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2386"
},
{
"name": "CVE-2007-4573",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4573"
},
{
"name": "CVE-2007-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0493"
},
{
"name": "CVE-2007-0752",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0752"
},
{
"name": "CVE-2007-0750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0750"
},
{
"name": "CVE-2007-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2390"
},
{
"name": "CVE-2007-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0740"
},
{
"name": "CVE-2006-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4095"
},
{
"name": "CVE-2007-0753",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0753"
},
{
"name": "CVE-2005-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3011"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 29 mai 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"title": "Message dans la liste de diffusion GNU concernant GNU Screen paru en octobre 2006 :",
"url": "http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 Fetchmail associ\u00e9 SA-2007-01 du 18 mars 2007 :",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
}
],
"reference": "CERTA-2007-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es : elles concernent le\nsyst\u00e8me d\u0027exploitation Mac OS X. L\u0027exploitation de ces derni\u00e8res peut\navoir des cons\u00e9quences vari\u00e9es, comme l\u0027ex\u00e9cution de code arbitraire, ou\nun dysfonctionnement du syst\u00e8me vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Apple 2007-005 305530 du 29 mai 2007",
"url": null
}
]
}
CERTA-2007-AVI-138
Vulnerability from certfr_avis - Published: - Updated:None
Description
Une vulnérabilité de type débordement d'entier dans la fonction file_printf du programme file permet à une personne malintentionnée d'exécuter du code arbitraire à distance avec les droits de l'utilisateur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
file versions antérieures à 4.20.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cTT\u003efile\u003c/TT\u003e versions ant\u00e9rieures \u00e0 4.20.\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier dans la fonction\nfile_printf du programme file permet \u00e0 une personne malintentionn\u00e9e\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec les droits de\nl\u0027utilisateur.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2799"
},
{
"name": "CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1274-1 du 02 avril 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1343-1 du 31 juillet 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1343"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:067 du 22 mars 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007-0391-3 du 30 mai 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0391.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD-SA-07:04 du 23 mai 2007 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:005 du 30 mars 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-179 du 04 mai 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200703-26 du 30 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-26.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007-0124-2 du 23 mars 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0124.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-439-1 du 21 mars 2007 :",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-25 du 31 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-25.xml"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 de file 4.20 du 02 mars 2007 :",
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
}
],
"reference": "CERTA-2007-AVI-138",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-26T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences Debian, Mandriva, SuSE, Gentoo, Avaya, Redhat, Ubuntu.",
"revision_date": "2007-05-07T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2007-05-29T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence CVE et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, RedHat.",
"revision_date": "2007-06-01T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2007-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 dans file",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de file",
"url": null
}
]
}
CERTA-2007-AVI-234
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées : elles concernent le système d'exploitation Mac OS X. L'exploitation de ces dernières peut avoir des conséquences variées, comme l'exécution de code arbitraire, ou un dysfonctionnement du système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Mac OS X. Parmi celles-ci :
- Alias Manager : il existerait, sous certaines conditions, une incohérence sur les noms de fichier lorsque deux images disque sont montées. Cette vulnérabilité pourrait être exploitée pour faire ouvrir et/ou exécuter un fichier différent de celui demandé sur le système vulnérable ;
- BIND : plusieurs vulnérabilités ont été corrigées dans le serveur DNS pour Mac OS X. Elles sont semblables à celles décrites dans les avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;
- CoreGraphics : l'application ne manipulerait pas correctement certains fichiers au format PDF (pour Portable Document Format), pouvant entraîner l'exécution de commande arbitraire à distance ;
- crontabs : le gestionnaire de tâches pourrait perturber le système de fichiers monté dans le répertoire /tmp, par le biais du script de nettoyage journalier.
- fetchmail : une vulnérabilité présente dans fetchmail permettrait de récupérer tout ou partie d'un mot de passe échangé au cours de l'initialisation de la connexion POP3. Cette vulnérabilité est différente de celle décrite dans CERTA-2007-AVI-020.
- file : la commande file ne manipule pas correctement certains fichiers, ce qui peut provoquer l'interruption de la commande, voire l'exécution de code arbitraire sur le système vulnérable.
- iChat : l'application de messagerie instantanée ne gère pas correctement certains paquets UPnP IGD (pour Internet Gateway Device Standardized Device Control Protocol). Une personne malveillante distante peut ainsi exploiter cette vulnérabilité en envoyant un paquet spécialement construit, afin de perturber l'application ou d'exécuter du code arbitraire à distance.
- mDNSResponder : le problème est identique à celui présenté pour iChat mais n'affecterait que les versions au moins équivalentes à Mac OS X v10.4 ;
- PPP : le démon PPP ne chargerait pas correctement certains modules au cours de son lancement en ligne de commandes, ce qui permettrait à une personne malveillante locale d'élever ses privilèges sur le système vulnérable ;
- ruby : les vulnérabilités corrigées ont été présentées dans l'avis CERTA-2006-AVI-562 ;
- screen : le service GNU Screen auraient plusieurs vulnérabilités exploitables par la ligne de commande screen, et qui provoqueraient sous certaines conditions un déni de service.
- texinfo : une vulnérabilité permettrait d'élever ses privilèges à ceux de l'utilisateur utilisant texinfo afin de créer ou d'écraser des fichiers d'accès limité.
- VPN : le démon vpnd ne manipulerait pas correctement certaines chaînes de caractères, permettant à un utilisateur local d'élever ses privilèges à ceux du système et d'exécuter du code arbitraire sur la machine.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Mac OS X Server v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.4.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X Server v10.4.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Mac OS X. Parmi celles-ci :\n\n- Alias Manager : il existerait, sous certaines conditions, une\n incoh\u00e9rence sur les noms de fichier lorsque deux images disque sont\n mont\u00e9es. Cette vuln\u00e9rabilit\u00e9 pourrait \u00eatre exploit\u00e9e pour faire\n ouvrir et/ou ex\u00e9cuter un fichier diff\u00e9rent de celui demand\u00e9 sur le\n syst\u00e8me vuln\u00e9rable ;\n- BIND : plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le serveur\n DNS pour Mac OS X. Elles sont semblables \u00e0 celles d\u00e9crites dans les\n avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;\n- CoreGraphics : l\u0027application ne manipulerait pas correctement\n certains fichiers au format PDF (pour Portable Document Format),\n pouvant entra\u00eener l\u0027ex\u00e9cution de commande arbitraire \u00e0 distance ;\n- crontabs : le gestionnaire de t\u00e2ches pourrait perturber le syst\u00e8me\n de fichiers mont\u00e9 dans le r\u00e9pertoire /tmp, par le biais du script de\n nettoyage journalier.\n- fetchmail : une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans fetchmail permettrait de\n r\u00e9cup\u00e9rer tout ou partie d\u0027un mot de passe \u00e9chang\u00e9 au cours de\n l\u0027initialisation de la connexion POP3. Cette vuln\u00e9rabilit\u00e9 est\n diff\u00e9rente de celle d\u00e9crite dans CERTA-2007-AVI-020.\n- file : la commande file ne manipule pas correctement certains\n fichiers, ce qui peut provoquer l\u0027interruption de la commande, voire\n l\u0027ex\u00e9cution de code arbitraire sur le syst\u00e8me vuln\u00e9rable.\n- iChat : l\u0027application de messagerie instantan\u00e9e ne g\u00e8re pas\n correctement certains paquets UPnP IGD (pour Internet Gateway Device\n Standardized Device Control Protocol). Une personne malveillante\n distante peut ainsi exploiter cette vuln\u00e9rabilit\u00e9 en envoyant un\n paquet sp\u00e9cialement construit, afin de perturber l\u0027application ou\n d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n- mDNSResponder : le probl\u00e8me est identique \u00e0 celui pr\u00e9sent\u00e9 pour\n iChat mais n\u0027affecterait que les versions au moins \u00e9quivalentes \u00e0\n Mac OS X v10.4 ;\n- PPP : le d\u00e9mon PPP ne chargerait pas correctement certains modules\n au cours de son lancement en ligne de commandes, ce qui permettrait\n \u00e0 une personne malveillante locale d\u0027\u00e9lever ses privil\u00e8ges sur le\n syst\u00e8me vuln\u00e9rable ;\n- ruby : les vuln\u00e9rabilit\u00e9s corrig\u00e9es ont \u00e9t\u00e9 pr\u00e9sent\u00e9es dans l\u0027avis\n CERTA-2006-AVI-562 ;\n- screen : le service GNU Screen auraient plusieurs vuln\u00e9rabilit\u00e9s\n exploitables par la ligne de commande screen, et qui provoqueraient\n sous certaines conditions un d\u00e9ni de service.\n- texinfo : une vuln\u00e9rabilit\u00e9 permettrait d\u0027\u00e9lever ses privil\u00e8ges \u00e0\n ceux de l\u0027utilisateur utilisant texinfo afin de cr\u00e9er ou d\u0027\u00e9craser\n des fichiers d\u0027acc\u00e8s limit\u00e9.\n- VPN : le d\u00e9mon vpnd ne manipulerait pas correctement certaines\n cha\u00eenes de caract\u00e8res, permettant \u00e0 un utilisateur local d\u0027\u00e9lever\n ses privil\u00e8ges \u00e0 ceux du syst\u00e8me et d\u0027ex\u00e9cuter du code arbitraire\n sur la machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-5467",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5467"
},
{
"name": "CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"name": "CVE-2006-6303",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6303"
},
{
"name": "CVE-2007-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0751"
},
{
"name": "CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
},
{
"name": "CVE-2007-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0494"
},
{
"name": "CVE-2006-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4096"
},
{
"name": "CVE-2007-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2386"
},
{
"name": "CVE-2007-4573",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4573"
},
{
"name": "CVE-2007-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0493"
},
{
"name": "CVE-2007-0752",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0752"
},
{
"name": "CVE-2007-0750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0750"
},
{
"name": "CVE-2007-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2390"
},
{
"name": "CVE-2007-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0740"
},
{
"name": "CVE-2006-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4095"
},
{
"name": "CVE-2007-0753",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0753"
},
{
"name": "CVE-2005-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3011"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 29 mai 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"title": "Message dans la liste de diffusion GNU concernant GNU Screen paru en octobre 2006 :",
"url": "http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 Fetchmail associ\u00e9 SA-2007-01 du 18 mars 2007 :",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
}
],
"reference": "CERTA-2007-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es : elles concernent le\nsyst\u00e8me d\u0027exploitation Mac OS X. L\u0027exploitation de ces derni\u00e8res peut\navoir des cons\u00e9quences vari\u00e9es, comme l\u0027ex\u00e9cution de code arbitraire, ou\nun dysfonctionnement du syst\u00e8me vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Apple 2007-005 305530 du 29 mai 2007",
"url": null
}
]
}
RHSA-2007_0124
Vulnerability from csaf_redhat - Published: 2007-03-23 10:08 - Updated: 2024-11-22 00:56Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2007:0124 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=233161 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=233337 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2007-1536 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=233164 | external |
| https://www.cve.org/CVERecord?id=CVE-2007-1536 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2007-1536 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated file package that fixes a security flaw is now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The file command is used to identify a particular file according to the\ntype of data contained by the file.\n\nAn integer underflow flaw was found in the file utility. An attacker could\ncreate a carefully crafted file which, if examined by a victim using the\nfile utility, could lead to arbitrary code execution. (CVE-2007-1536)\n\nThis issue did not affect the version of the file utility distributed with\nRed Hat Enterprise Linux 2.1 or 3.\n\nUsers should upgrade to this erratum package, which contain a backported\npatch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0124",
"url": "https://access.redhat.com/errata/RHSA-2007:0124"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "233161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233161"
},
{
"category": "external",
"summary": "233337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233337"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0124.json"
}
],
"title": "Red Hat Security Advisory: file security update",
"tracking": {
"current_release_date": "2024-11-22T00:56:45+00:00",
"generator": {
"date": "2024-11-22T00:56:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0124",
"initial_release_date": "2007-03-23T10:08:00+00:00",
"revision_history": [
{
"date": "2007-03-23T10:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-03-23T06:08:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:56:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.ia64",
"product": {
"name": "file-0:4.10-3.EL4.5.ia64",
"product_id": "file-0:4.10-3.EL4.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.ia64",
"product": {
"name": "file-0:4.17-9.el5.ia64",
"product_id": "file-0:4.17-9.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.ia64",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.ia64",
"product_id": "file-debuginfo-0:4.17-9.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.src",
"product": {
"name": "file-0:4.10-3.EL4.5.src",
"product_id": "file-0:4.10-3.EL4.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=src"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.src",
"product": {
"name": "file-0:4.17-9.el5.src",
"product_id": "file-0:4.17-9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.x86_64",
"product": {
"name": "file-0:4.10-3.EL4.5.x86_64",
"product_id": "file-0:4.10-3.EL4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.x86_64",
"product": {
"name": "file-0:4.17-9.el5.x86_64",
"product_id": "file-0:4.17-9.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.x86_64",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64",
"product_id": "file-debuginfo-0:4.17-9.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.i386",
"product": {
"name": "file-0:4.10-3.EL4.5.i386",
"product_id": "file-0:4.10-3.EL4.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.i386",
"product": {
"name": "file-0:4.17-9.el5.i386",
"product_id": "file-0:4.17-9.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.i386",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.i386",
"product_id": "file-debuginfo-0:4.17-9.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.ppc",
"product": {
"name": "file-0:4.10-3.EL4.5.ppc",
"product_id": "file-0:4.10-3.EL4.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.ppc",
"product": {
"name": "file-0:4.17-9.el5.ppc",
"product_id": "file-0:4.17-9.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.ppc",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.ppc",
"product_id": "file-debuginfo-0:4.17-9.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.s390",
"product": {
"name": "file-0:4.10-3.EL4.5.s390",
"product_id": "file-0:4.10-3.EL4.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.s390x",
"product": {
"name": "file-0:4.10-3.EL4.5.s390x",
"product_id": "file-0:4.10-3.EL4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.s390x",
"product": {
"name": "file-0:4.17-9.el5.s390x",
"product_id": "file-0:4.17-9.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.s390x",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.s390x",
"product_id": "file-debuginfo-0:4.17-9.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.i386"
},
"product_reference": "file-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.ia64"
},
"product_reference": "file-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.ppc"
},
"product_reference": "file-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.s390x"
},
"product_reference": "file-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.src"
},
"product_reference": "file-0:4.17-9.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.x86_64"
},
"product_reference": "file-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.i386"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.ia64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.ppc"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.s390x"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.x86_64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.i386"
},
"product_reference": "file-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.ia64"
},
"product_reference": "file-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.ppc"
},
"product_reference": "file-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.s390x"
},
"product_reference": "file-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.src"
},
"product_reference": "file-0:4.17-9.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.x86_64"
},
"product_reference": "file-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.i386"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.ia64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.ppc"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.s390x"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.x86_64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1536",
"discovery_date": "2007-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "233164"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "file 4.20 fixes a heap overflow in that can result in arbitrary code execution",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:file-0:4.10-3.EL4.5.i386",
"4AS:file-0:4.10-3.EL4.5.ia64",
"4AS:file-0:4.10-3.EL4.5.ppc",
"4AS:file-0:4.10-3.EL4.5.s390",
"4AS:file-0:4.10-3.EL4.5.s390x",
"4AS:file-0:4.10-3.EL4.5.src",
"4AS:file-0:4.10-3.EL4.5.x86_64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-0:4.10-3.EL4.5.i386",
"4Desktop:file-0:4.10-3.EL4.5.ia64",
"4Desktop:file-0:4.10-3.EL4.5.ppc",
"4Desktop:file-0:4.10-3.EL4.5.s390",
"4Desktop:file-0:4.10-3.EL4.5.s390x",
"4Desktop:file-0:4.10-3.EL4.5.src",
"4Desktop:file-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4ES:file-0:4.10-3.EL4.5.i386",
"4ES:file-0:4.10-3.EL4.5.ia64",
"4ES:file-0:4.10-3.EL4.5.ppc",
"4ES:file-0:4.10-3.EL4.5.s390",
"4ES:file-0:4.10-3.EL4.5.s390x",
"4ES:file-0:4.10-3.EL4.5.src",
"4ES:file-0:4.10-3.EL4.5.x86_64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.i386",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4WS:file-0:4.10-3.EL4.5.i386",
"4WS:file-0:4.10-3.EL4.5.ia64",
"4WS:file-0:4.10-3.EL4.5.ppc",
"4WS:file-0:4.10-3.EL4.5.s390",
"4WS:file-0:4.10-3.EL4.5.s390x",
"4WS:file-0:4.10-3.EL4.5.src",
"4WS:file-0:4.10-3.EL4.5.x86_64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"5Client:file-0:4.17-9.el5.i386",
"5Client:file-0:4.17-9.el5.ia64",
"5Client:file-0:4.17-9.el5.ppc",
"5Client:file-0:4.17-9.el5.s390x",
"5Client:file-0:4.17-9.el5.src",
"5Client:file-0:4.17-9.el5.x86_64",
"5Client:file-debuginfo-0:4.17-9.el5.i386",
"5Client:file-debuginfo-0:4.17-9.el5.ia64",
"5Client:file-debuginfo-0:4.17-9.el5.ppc",
"5Client:file-debuginfo-0:4.17-9.el5.s390x",
"5Client:file-debuginfo-0:4.17-9.el5.x86_64",
"5Server:file-0:4.17-9.el5.i386",
"5Server:file-0:4.17-9.el5.ia64",
"5Server:file-0:4.17-9.el5.ppc",
"5Server:file-0:4.17-9.el5.s390x",
"5Server:file-0:4.17-9.el5.src",
"5Server:file-0:4.17-9.el5.x86_64",
"5Server:file-debuginfo-0:4.17-9.el5.i386",
"5Server:file-debuginfo-0:4.17-9.el5.ia64",
"5Server:file-debuginfo-0:4.17-9.el5.ppc",
"5Server:file-debuginfo-0:4.17-9.el5.s390x",
"5Server:file-debuginfo-0:4.17-9.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1536"
},
{
"category": "external",
"summary": "RHBZ#233164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1536"
}
],
"release_date": "2007-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-03-23T10:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:file-0:4.10-3.EL4.5.i386",
"4AS:file-0:4.10-3.EL4.5.ia64",
"4AS:file-0:4.10-3.EL4.5.ppc",
"4AS:file-0:4.10-3.EL4.5.s390",
"4AS:file-0:4.10-3.EL4.5.s390x",
"4AS:file-0:4.10-3.EL4.5.src",
"4AS:file-0:4.10-3.EL4.5.x86_64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-0:4.10-3.EL4.5.i386",
"4Desktop:file-0:4.10-3.EL4.5.ia64",
"4Desktop:file-0:4.10-3.EL4.5.ppc",
"4Desktop:file-0:4.10-3.EL4.5.s390",
"4Desktop:file-0:4.10-3.EL4.5.s390x",
"4Desktop:file-0:4.10-3.EL4.5.src",
"4Desktop:file-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4ES:file-0:4.10-3.EL4.5.i386",
"4ES:file-0:4.10-3.EL4.5.ia64",
"4ES:file-0:4.10-3.EL4.5.ppc",
"4ES:file-0:4.10-3.EL4.5.s390",
"4ES:file-0:4.10-3.EL4.5.s390x",
"4ES:file-0:4.10-3.EL4.5.src",
"4ES:file-0:4.10-3.EL4.5.x86_64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.i386",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4WS:file-0:4.10-3.EL4.5.i386",
"4WS:file-0:4.10-3.EL4.5.ia64",
"4WS:file-0:4.10-3.EL4.5.ppc",
"4WS:file-0:4.10-3.EL4.5.s390",
"4WS:file-0:4.10-3.EL4.5.s390x",
"4WS:file-0:4.10-3.EL4.5.src",
"4WS:file-0:4.10-3.EL4.5.x86_64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"5Client:file-0:4.17-9.el5.i386",
"5Client:file-0:4.17-9.el5.ia64",
"5Client:file-0:4.17-9.el5.ppc",
"5Client:file-0:4.17-9.el5.s390x",
"5Client:file-0:4.17-9.el5.src",
"5Client:file-0:4.17-9.el5.x86_64",
"5Client:file-debuginfo-0:4.17-9.el5.i386",
"5Client:file-debuginfo-0:4.17-9.el5.ia64",
"5Client:file-debuginfo-0:4.17-9.el5.ppc",
"5Client:file-debuginfo-0:4.17-9.el5.s390x",
"5Client:file-debuginfo-0:4.17-9.el5.x86_64",
"5Server:file-0:4.17-9.el5.i386",
"5Server:file-0:4.17-9.el5.ia64",
"5Server:file-0:4.17-9.el5.ppc",
"5Server:file-0:4.17-9.el5.s390x",
"5Server:file-0:4.17-9.el5.src",
"5Server:file-0:4.17-9.el5.x86_64",
"5Server:file-debuginfo-0:4.17-9.el5.i386",
"5Server:file-debuginfo-0:4.17-9.el5.ia64",
"5Server:file-debuginfo-0:4.17-9.el5.ppc",
"5Server:file-debuginfo-0:4.17-9.el5.s390x",
"5Server:file-debuginfo-0:4.17-9.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0124"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "file 4.20 fixes a heap overflow in that can result in arbitrary code execution"
}
]
}
RHSA-2007:0124
Vulnerability from csaf_redhat - Published: 2007-03-23 10:08 - Updated: 2025-11-21 17:31Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:file-debuginfo-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:file-debuginfo-0:4.17-9.el5.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2007:0124 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=233337 | external |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=233161 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2007-1536 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=233164 | external |
| https://www.cve.org/CVERecord?id=CVE-2007-1536 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2007-1536 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated file package that fixes a security flaw is now available for Red\nHat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The file command is used to identify a particular file according to the\ntype of data contained by the file.\n\nAn integer underflow flaw was found in the file utility. An attacker could\ncreate a carefully crafted file which, if examined by a victim using the\nfile utility, could lead to arbitrary code execution. (CVE-2007-1536)\n\nThis issue did not affect the version of the file utility distributed with\nRed Hat Enterprise Linux 2.1 or 3.\n\nUsers should upgrade to this erratum package, which contain a backported\npatch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0124",
"url": "https://access.redhat.com/errata/RHSA-2007:0124"
},
{
"category": "external",
"summary": "233337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "233161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233161"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0124.json"
}
],
"title": "Red Hat Security Advisory: file security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:22+00:00",
"generator": {
"date": "2025-11-21T17:31:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0124",
"initial_release_date": "2007-03-23T10:08:00+00:00",
"revision_history": [
{
"date": "2007-03-23T10:08:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-03-23T06:08:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.ia64",
"product": {
"name": "file-0:4.10-3.EL4.5.ia64",
"product_id": "file-0:4.10-3.EL4.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.ia64",
"product": {
"name": "file-0:4.17-9.el5.ia64",
"product_id": "file-0:4.17-9.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.ia64",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.ia64",
"product_id": "file-debuginfo-0:4.17-9.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.src",
"product": {
"name": "file-0:4.10-3.EL4.5.src",
"product_id": "file-0:4.10-3.EL4.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=src"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.src",
"product": {
"name": "file-0:4.17-9.el5.src",
"product_id": "file-0:4.17-9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.x86_64",
"product": {
"name": "file-0:4.10-3.EL4.5.x86_64",
"product_id": "file-0:4.10-3.EL4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.x86_64",
"product": {
"name": "file-0:4.17-9.el5.x86_64",
"product_id": "file-0:4.17-9.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.x86_64",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64",
"product_id": "file-debuginfo-0:4.17-9.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.i386",
"product": {
"name": "file-0:4.10-3.EL4.5.i386",
"product_id": "file-0:4.10-3.EL4.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.i386",
"product": {
"name": "file-0:4.17-9.el5.i386",
"product_id": "file-0:4.17-9.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.i386",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.i386",
"product_id": "file-debuginfo-0:4.17-9.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.ppc",
"product": {
"name": "file-0:4.10-3.EL4.5.ppc",
"product_id": "file-0:4.10-3.EL4.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.ppc",
"product": {
"name": "file-0:4.17-9.el5.ppc",
"product_id": "file-0:4.17-9.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.ppc",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.ppc",
"product_id": "file-debuginfo-0:4.17-9.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.s390",
"product": {
"name": "file-0:4.10-3.EL4.5.s390",
"product_id": "file-0:4.10-3.EL4.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "file-0:4.10-3.EL4.5.s390x",
"product": {
"name": "file-0:4.10-3.EL4.5.s390x",
"product_id": "file-0:4.10-3.EL4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.10-3.EL4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product_id": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.10-3.EL4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-0:4.17-9.el5.s390x",
"product": {
"name": "file-0:4.17-9.el5.s390x",
"product_id": "file-0:4.17-9.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file@4.17-9.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "file-debuginfo-0:4.17-9.el5.s390x",
"product": {
"name": "file-debuginfo-0:4.17-9.el5.s390x",
"product_id": "file-debuginfo-0:4.17-9.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/file-debuginfo@4.17-9.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.src"
},
"product_reference": "file-0:4.10-3.EL4.5.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.i386"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.ia64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.ppc"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.s390"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.s390x"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.10-3.EL4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64"
},
"product_reference": "file-debuginfo-0:4.10-3.EL4.5.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.i386"
},
"product_reference": "file-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.ia64"
},
"product_reference": "file-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.ppc"
},
"product_reference": "file-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.s390x"
},
"product_reference": "file-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.src"
},
"product_reference": "file-0:4.17-9.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-0:4.17-9.el5.x86_64"
},
"product_reference": "file-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.i386"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.ia64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.ppc"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.s390x"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:file-debuginfo-0:4.17-9.el5.x86_64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.i386"
},
"product_reference": "file-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.ia64"
},
"product_reference": "file-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.ppc"
},
"product_reference": "file-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.s390x"
},
"product_reference": "file-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.src"
},
"product_reference": "file-0:4.17-9.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-0:4.17-9.el5.x86_64"
},
"product_reference": "file-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.i386"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.ia64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.ppc"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.s390x"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-debuginfo-0:4.17-9.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:file-debuginfo-0:4.17-9.el5.x86_64"
},
"product_reference": "file-debuginfo-0:4.17-9.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1536",
"discovery_date": "2007-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "233164"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "file 4.20 fixes a heap overflow in that can result in arbitrary code execution",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:file-0:4.10-3.EL4.5.i386",
"4AS:file-0:4.10-3.EL4.5.ia64",
"4AS:file-0:4.10-3.EL4.5.ppc",
"4AS:file-0:4.10-3.EL4.5.s390",
"4AS:file-0:4.10-3.EL4.5.s390x",
"4AS:file-0:4.10-3.EL4.5.src",
"4AS:file-0:4.10-3.EL4.5.x86_64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-0:4.10-3.EL4.5.i386",
"4Desktop:file-0:4.10-3.EL4.5.ia64",
"4Desktop:file-0:4.10-3.EL4.5.ppc",
"4Desktop:file-0:4.10-3.EL4.5.s390",
"4Desktop:file-0:4.10-3.EL4.5.s390x",
"4Desktop:file-0:4.10-3.EL4.5.src",
"4Desktop:file-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4ES:file-0:4.10-3.EL4.5.i386",
"4ES:file-0:4.10-3.EL4.5.ia64",
"4ES:file-0:4.10-3.EL4.5.ppc",
"4ES:file-0:4.10-3.EL4.5.s390",
"4ES:file-0:4.10-3.EL4.5.s390x",
"4ES:file-0:4.10-3.EL4.5.src",
"4ES:file-0:4.10-3.EL4.5.x86_64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.i386",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4WS:file-0:4.10-3.EL4.5.i386",
"4WS:file-0:4.10-3.EL4.5.ia64",
"4WS:file-0:4.10-3.EL4.5.ppc",
"4WS:file-0:4.10-3.EL4.5.s390",
"4WS:file-0:4.10-3.EL4.5.s390x",
"4WS:file-0:4.10-3.EL4.5.src",
"4WS:file-0:4.10-3.EL4.5.x86_64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"5Client:file-0:4.17-9.el5.i386",
"5Client:file-0:4.17-9.el5.ia64",
"5Client:file-0:4.17-9.el5.ppc",
"5Client:file-0:4.17-9.el5.s390x",
"5Client:file-0:4.17-9.el5.src",
"5Client:file-0:4.17-9.el5.x86_64",
"5Client:file-debuginfo-0:4.17-9.el5.i386",
"5Client:file-debuginfo-0:4.17-9.el5.ia64",
"5Client:file-debuginfo-0:4.17-9.el5.ppc",
"5Client:file-debuginfo-0:4.17-9.el5.s390x",
"5Client:file-debuginfo-0:4.17-9.el5.x86_64",
"5Server:file-0:4.17-9.el5.i386",
"5Server:file-0:4.17-9.el5.ia64",
"5Server:file-0:4.17-9.el5.ppc",
"5Server:file-0:4.17-9.el5.s390x",
"5Server:file-0:4.17-9.el5.src",
"5Server:file-0:4.17-9.el5.x86_64",
"5Server:file-debuginfo-0:4.17-9.el5.i386",
"5Server:file-debuginfo-0:4.17-9.el5.ia64",
"5Server:file-debuginfo-0:4.17-9.el5.ppc",
"5Server:file-debuginfo-0:4.17-9.el5.s390x",
"5Server:file-debuginfo-0:4.17-9.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1536"
},
{
"category": "external",
"summary": "RHBZ#233164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=233164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1536"
}
],
"release_date": "2007-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-03-23T10:08:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:file-0:4.10-3.EL4.5.i386",
"4AS:file-0:4.10-3.EL4.5.ia64",
"4AS:file-0:4.10-3.EL4.5.ppc",
"4AS:file-0:4.10-3.EL4.5.s390",
"4AS:file-0:4.10-3.EL4.5.s390x",
"4AS:file-0:4.10-3.EL4.5.src",
"4AS:file-0:4.10-3.EL4.5.x86_64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4AS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4AS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4AS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-0:4.10-3.EL4.5.i386",
"4Desktop:file-0:4.10-3.EL4.5.ia64",
"4Desktop:file-0:4.10-3.EL4.5.ppc",
"4Desktop:file-0:4.10-3.EL4.5.s390",
"4Desktop:file-0:4.10-3.EL4.5.s390x",
"4Desktop:file-0:4.10-3.EL4.5.src",
"4Desktop:file-0:4.10-3.EL4.5.x86_64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.i386",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4Desktop:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4ES:file-0:4.10-3.EL4.5.i386",
"4ES:file-0:4.10-3.EL4.5.ia64",
"4ES:file-0:4.10-3.EL4.5.ppc",
"4ES:file-0:4.10-3.EL4.5.s390",
"4ES:file-0:4.10-3.EL4.5.s390x",
"4ES:file-0:4.10-3.EL4.5.src",
"4ES:file-0:4.10-3.EL4.5.x86_64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.i386",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4ES:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390",
"4ES:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4ES:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"4WS:file-0:4.10-3.EL4.5.i386",
"4WS:file-0:4.10-3.EL4.5.ia64",
"4WS:file-0:4.10-3.EL4.5.ppc",
"4WS:file-0:4.10-3.EL4.5.s390",
"4WS:file-0:4.10-3.EL4.5.s390x",
"4WS:file-0:4.10-3.EL4.5.src",
"4WS:file-0:4.10-3.EL4.5.x86_64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.i386",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ia64",
"4WS:file-debuginfo-0:4.10-3.EL4.5.ppc",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390",
"4WS:file-debuginfo-0:4.10-3.EL4.5.s390x",
"4WS:file-debuginfo-0:4.10-3.EL4.5.x86_64",
"5Client:file-0:4.17-9.el5.i386",
"5Client:file-0:4.17-9.el5.ia64",
"5Client:file-0:4.17-9.el5.ppc",
"5Client:file-0:4.17-9.el5.s390x",
"5Client:file-0:4.17-9.el5.src",
"5Client:file-0:4.17-9.el5.x86_64",
"5Client:file-debuginfo-0:4.17-9.el5.i386",
"5Client:file-debuginfo-0:4.17-9.el5.ia64",
"5Client:file-debuginfo-0:4.17-9.el5.ppc",
"5Client:file-debuginfo-0:4.17-9.el5.s390x",
"5Client:file-debuginfo-0:4.17-9.el5.x86_64",
"5Server:file-0:4.17-9.el5.i386",
"5Server:file-0:4.17-9.el5.ia64",
"5Server:file-0:4.17-9.el5.ppc",
"5Server:file-0:4.17-9.el5.s390x",
"5Server:file-0:4.17-9.el5.src",
"5Server:file-0:4.17-9.el5.x86_64",
"5Server:file-debuginfo-0:4.17-9.el5.i386",
"5Server:file-debuginfo-0:4.17-9.el5.ia64",
"5Server:file-debuginfo-0:4.17-9.el5.ppc",
"5Server:file-debuginfo-0:4.17-9.el5.s390x",
"5Server:file-debuginfo-0:4.17-9.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0124"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "file 4.20 fixes a heap overflow in that can result in arbitrary code execution"
}
]
}
FKIE_CVE-2007-1536
Vulnerability from fkie_nvd - Published: 2007-03-20 20:19 - Updated: 2026-04-23 00:35| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc | ||
| cve@mitre.org | http://docs.info.apple.com/article.html?artnum=305530 | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2007/May/msg00004.html | ||
| cve@mitre.org | http://mx.gw.com/pipermail/file/2007/000161.html | Patch | |
| cve@mitre.org | http://openbsd.org/errata40.html#015_file | ||
| cve@mitre.org | http://secunia.com/advisories/24548 | Patch, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24592 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24604 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24608 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24616 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24617 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24723 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/24754 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25133 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25393 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25402 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25931 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25989 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/27307 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/27314 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29179 | Vendor Advisory | |
| cve@mitre.org | http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-200703-26.xml | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-200710-19.xml | ||
| cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.512926 | ||
| cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm | ||
| cve@mitre.org | http://www.debian.org/security/2007/dsa-1274 | ||
| cve@mitre.org | http://www.kb.cert.org/vuls/id/606700 | US Government Resource | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:067 | ||
| cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_40_file.html | ||
| cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_5_sr.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0124.html | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/477861/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/477950/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/23021 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1017796 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/usn-439-1 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1040 | Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1939 | Vendor Advisory | |
| cve@mitre.org | https://bugs.gentoo.org/show_bug.cgi?id=171452 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36283 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-1148 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658 | ||
| af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=305530 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2007/May/msg00004.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://mx.gw.com/pipermail/file/2007/000161.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://openbsd.org/errata40.html#015_file | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24548 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24592 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24604 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24608 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24616 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24617 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24723 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24754 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25133 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25393 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25402 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25931 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25989 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27307 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27314 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29179 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200703-26.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200710-19.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.512926 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1274 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/606700 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:067 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_40_file.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_5_sr.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0124.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/477861/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/477950/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/23021 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1017796 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-439-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1040 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1939 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.gentoo.org/show_bug.cgi?id=171452 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36283 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1148 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:file:file:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DDA4B95-1EEE-4EF9-8155-DDC349952C24",
"versionEndIncluding": "4.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow."
},
{
"lang": "es",
"value": "Un subdesbordamiento de enteros en la funci\u00f3n file_printf en el programa \"file\" anterior a versi\u00f3n 4.20, permite a los atacantes asistidos por el usuario ejecutar c\u00f3digo arbitrario por medio de un archivo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria."
}
],
"id": "CVE-2007-1536",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-03-20T20:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"source": "cve@mitre.org",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"source": "cve@mitre.org",
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24548"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24592"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24604"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24608"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24616"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24617"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24723"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24754"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25133"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25393"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25931"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25989"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27307"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27314"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29179"
},
{
"source": "cve@mitre.org",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"source": "cve@mitre.org",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
},
{
"source": "cve@mitre.org",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/23021"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017796"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"source": "cve@mitre.org",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24592"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24617"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24754"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25931"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/23021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10755-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2007-1536/ | self |
| https://www.suse.com/security/cve/CVE-2007-2799/ | self |
| https://www.suse.com/security/cve/CVE-2017-1000249/ | self |
| https://www.suse.com/security/cve/CVE-2018-10360/ | self |
| https://www.suse.com/security/cve/CVE-2019-18218/ | self |
| https://www.suse.com/security/cve/CVE-2019-8904/ | self |
| https://www.suse.com/security/cve/CVE-2019-8907/ | self |
| https://www.suse.com/security/cve/CVE-2007-1536 | external |
| https://bugzilla.suse.com/256290 | external |
| https://www.suse.com/security/cve/CVE-2007-2799 | external |
| https://bugzilla.suse.com/256290 | external |
| https://www.suse.com/security/cve/CVE-2017-1000249 | external |
| https://bugzilla.suse.com/1056838 | external |
| https://www.suse.com/security/cve/CVE-2018-10360 | external |
| https://bugzilla.suse.com/1096974 | external |
| https://bugzilla.suse.com/1096984 | external |
| https://bugzilla.suse.com/1126118 | external |
| https://www.suse.com/security/cve/CVE-2019-18218 | external |
| https://bugzilla.suse.com/1154661 | external |
| https://bugzilla.suse.com/1190368 | external |
| https://bugzilla.suse.com/1191838 | external |
| https://www.suse.com/security/cve/CVE-2019-8904 | external |
| https://bugzilla.suse.com/1126121 | external |
| https://www.suse.com/security/cve/CVE-2019-8907 | external |
| https://bugzilla.suse.com/1126117 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "file-5.40-1.14 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the file-5.40-1.14 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10755",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10755-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1536 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-2799 page",
"url": "https://www.suse.com/security/cve/CVE-2007-2799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000249 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8904 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8907/"
}
],
"title": "file-5.40-1.14 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10755-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "file-5.40-1.14.aarch64",
"product": {
"name": "file-5.40-1.14.aarch64",
"product_id": "file-5.40-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "file-devel-5.40-1.14.aarch64",
"product": {
"name": "file-devel-5.40-1.14.aarch64",
"product_id": "file-devel-5.40-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "file-devel-32bit-5.40-1.14.aarch64",
"product": {
"name": "file-devel-32bit-5.40-1.14.aarch64",
"product_id": "file-devel-32bit-5.40-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "file-magic-5.40-1.14.aarch64",
"product": {
"name": "file-magic-5.40-1.14.aarch64",
"product_id": "file-magic-5.40-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "libmagic1-5.40-1.14.aarch64",
"product": {
"name": "libmagic1-5.40-1.14.aarch64",
"product_id": "libmagic1-5.40-1.14.aarch64"
}
},
{
"category": "product_version",
"name": "libmagic1-32bit-5.40-1.14.aarch64",
"product": {
"name": "libmagic1-32bit-5.40-1.14.aarch64",
"product_id": "libmagic1-32bit-5.40-1.14.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "file-5.40-1.14.ppc64le",
"product": {
"name": "file-5.40-1.14.ppc64le",
"product_id": "file-5.40-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "file-devel-5.40-1.14.ppc64le",
"product": {
"name": "file-devel-5.40-1.14.ppc64le",
"product_id": "file-devel-5.40-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "file-devel-32bit-5.40-1.14.ppc64le",
"product": {
"name": "file-devel-32bit-5.40-1.14.ppc64le",
"product_id": "file-devel-32bit-5.40-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "file-magic-5.40-1.14.ppc64le",
"product": {
"name": "file-magic-5.40-1.14.ppc64le",
"product_id": "file-magic-5.40-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "libmagic1-5.40-1.14.ppc64le",
"product": {
"name": "libmagic1-5.40-1.14.ppc64le",
"product_id": "libmagic1-5.40-1.14.ppc64le"
}
},
{
"category": "product_version",
"name": "libmagic1-32bit-5.40-1.14.ppc64le",
"product": {
"name": "libmagic1-32bit-5.40-1.14.ppc64le",
"product_id": "libmagic1-32bit-5.40-1.14.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "file-5.40-1.14.s390x",
"product": {
"name": "file-5.40-1.14.s390x",
"product_id": "file-5.40-1.14.s390x"
}
},
{
"category": "product_version",
"name": "file-devel-5.40-1.14.s390x",
"product": {
"name": "file-devel-5.40-1.14.s390x",
"product_id": "file-devel-5.40-1.14.s390x"
}
},
{
"category": "product_version",
"name": "file-devel-32bit-5.40-1.14.s390x",
"product": {
"name": "file-devel-32bit-5.40-1.14.s390x",
"product_id": "file-devel-32bit-5.40-1.14.s390x"
}
},
{
"category": "product_version",
"name": "file-magic-5.40-1.14.s390x",
"product": {
"name": "file-magic-5.40-1.14.s390x",
"product_id": "file-magic-5.40-1.14.s390x"
}
},
{
"category": "product_version",
"name": "libmagic1-5.40-1.14.s390x",
"product": {
"name": "libmagic1-5.40-1.14.s390x",
"product_id": "libmagic1-5.40-1.14.s390x"
}
},
{
"category": "product_version",
"name": "libmagic1-32bit-5.40-1.14.s390x",
"product": {
"name": "libmagic1-32bit-5.40-1.14.s390x",
"product_id": "libmagic1-32bit-5.40-1.14.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "file-5.40-1.14.x86_64",
"product": {
"name": "file-5.40-1.14.x86_64",
"product_id": "file-5.40-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "file-devel-5.40-1.14.x86_64",
"product": {
"name": "file-devel-5.40-1.14.x86_64",
"product_id": "file-devel-5.40-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "file-devel-32bit-5.40-1.14.x86_64",
"product": {
"name": "file-devel-32bit-5.40-1.14.x86_64",
"product_id": "file-devel-32bit-5.40-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "file-magic-5.40-1.14.x86_64",
"product": {
"name": "file-magic-5.40-1.14.x86_64",
"product_id": "file-magic-5.40-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "libmagic1-5.40-1.14.x86_64",
"product": {
"name": "libmagic1-5.40-1.14.x86_64",
"product_id": "libmagic1-5.40-1.14.x86_64"
}
},
{
"category": "product_version",
"name": "libmagic1-32bit-5.40-1.14.x86_64",
"product": {
"name": "libmagic1-32bit-5.40-1.14.x86_64",
"product_id": "libmagic1-32bit-5.40-1.14.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "file-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-5.40-1.14.aarch64"
},
"product_reference": "file-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-5.40-1.14.ppc64le"
},
"product_reference": "file-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-5.40-1.14.s390x"
},
"product_reference": "file-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-5.40-1.14.x86_64"
},
"product_reference": "file-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64"
},
"product_reference": "file-devel-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le"
},
"product_reference": "file-devel-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-5.40-1.14.s390x"
},
"product_reference": "file-devel-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64"
},
"product_reference": "file-devel-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-32bit-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64"
},
"product_reference": "file-devel-32bit-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-32bit-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le"
},
"product_reference": "file-devel-32bit-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-32bit-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x"
},
"product_reference": "file-devel-32bit-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-devel-32bit-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64"
},
"product_reference": "file-devel-32bit-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-magic-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64"
},
"product_reference": "file-magic-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-magic-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le"
},
"product_reference": "file-magic-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-magic-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-magic-5.40-1.14.s390x"
},
"product_reference": "file-magic-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "file-magic-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64"
},
"product_reference": "file-magic-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64"
},
"product_reference": "libmagic1-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le"
},
"product_reference": "libmagic1-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x"
},
"product_reference": "libmagic1-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
},
"product_reference": "libmagic1-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-32bit-5.40-1.14.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64"
},
"product_reference": "libmagic1-32bit-5.40-1.14.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-32bit-5.40-1.14.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le"
},
"product_reference": "libmagic1-32bit-5.40-1.14.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-32bit-5.40-1.14.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x"
},
"product_reference": "libmagic1-32bit-5.40-1.14.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmagic1-32bit-5.40-1.14.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64"
},
"product_reference": "libmagic1-32bit-5.40-1.14.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1536"
}
],
"notes": [
{
"category": "general",
"text": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1536",
"url": "https://www.suse.com/security/cve/CVE-2007-1536"
},
{
"category": "external",
"summary": "SUSE Bug 256290 for CVE-2007-1536",
"url": "https://bugzilla.suse.com/256290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2007-1536"
},
{
"cve": "CVE-2007-2799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-2799"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the \"file\" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-2799",
"url": "https://www.suse.com/security/cve/CVE-2007-2799"
},
{
"category": "external",
"summary": "SUSE Bug 256290 for CVE-2007-2799",
"url": "https://bugzilla.suse.com/256290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-2799"
},
{
"cve": "CVE-2017-1000249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000249"
}
],
"notes": [
{
"category": "general",
"text": "An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000249",
"url": "https://www.suse.com/security/cve/CVE-2017-1000249"
},
{
"category": "external",
"summary": "SUSE Bug 1056838 for CVE-2017-1000249",
"url": "https://bugzilla.suse.com/1056838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000249"
},
{
"cve": "CVE-2018-10360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10360"
}
],
"notes": [
{
"category": "general",
"text": "The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10360",
"url": "https://www.suse.com/security/cve/CVE-2018-10360"
},
{
"category": "external",
"summary": "SUSE Bug 1096974 for CVE-2018-10360",
"url": "https://bugzilla.suse.com/1096974"
},
{
"category": "external",
"summary": "SUSE Bug 1096984 for CVE-2018-10360",
"url": "https://bugzilla.suse.com/1096984"
},
{
"category": "external",
"summary": "SUSE Bug 1126118 for CVE-2018-10360",
"url": "https://bugzilla.suse.com/1126118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10360"
},
{
"cve": "CVE-2019-18218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18218"
}
],
"notes": [
{
"category": "general",
"text": "cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18218",
"url": "https://www.suse.com/security/cve/CVE-2019-18218"
},
{
"category": "external",
"summary": "SUSE Bug 1154661 for CVE-2019-18218",
"url": "https://bugzilla.suse.com/1154661"
},
{
"category": "external",
"summary": "SUSE Bug 1190368 for CVE-2019-18218",
"url": "https://bugzilla.suse.com/1190368"
},
{
"category": "external",
"summary": "SUSE Bug 1191838 for CVE-2019-18218",
"url": "https://bugzilla.suse.com/1191838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2019-18218"
},
{
"cve": "CVE-2019-8904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8904"
}
],
"notes": [
{
"category": "general",
"text": "do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8904",
"url": "https://www.suse.com/security/cve/CVE-2019-8904"
},
{
"category": "external",
"summary": "SUSE Bug 1126121 for CVE-2019-8904",
"url": "https://bugzilla.suse.com/1126121"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8904"
},
{
"cve": "CVE-2019-8907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8907"
}
],
"notes": [
{
"category": "general",
"text": "do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8907",
"url": "https://www.suse.com/security/cve/CVE-2019-8907"
},
{
"category": "external",
"summary": "SUSE Bug 1126117 for CVE-2019-8907",
"url": "https://bugzilla.suse.com/1126117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:file-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-devel-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-devel-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-devel-5.40-1.14.x86_64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.aarch64",
"openSUSE Tumbleweed:file-magic-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:file-magic-5.40-1.14.s390x",
"openSUSE Tumbleweed:file-magic-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-32bit-5.40-1.14.x86_64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.aarch64",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.ppc64le",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.s390x",
"openSUSE Tumbleweed:libmagic1-5.40-1.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8907"
}
]
}
GSD-2007-1536
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-1536",
"description": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"id": "GSD-2007-1536",
"references": [
"https://www.suse.com/security/cve/CVE-2007-1536.html",
"https://www.debian.org/security/2007/dsa-1274",
"https://access.redhat.com/errata/RHSA-2007:0124",
"https://linux.oracle.com/cve/CVE-2007-1536.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-1536"
],
"details": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"id": "GSD-2007-1536",
"modified": "2023-12-13T01:21:40.050668Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1536",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27314"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "25393",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25393"
},
{
"name": "29179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29179"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "23021",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23021"
},
{
"name": "24616",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24616"
},
{
"name": "1017796",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017796"
},
{
"name": "[4.0] 20070709 015: SECURITY FIX: July 9, 2007",
"refsource": "OPENBSD",
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"name": "27307",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27307"
},
{
"name": "[file] 20070302 file-4.20 is now available",
"refsource": "MLIST",
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"name": "MDKSA-2007:067",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"name": "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"name": "SUSE-SR:2007:005",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"name": "24723",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24723"
},
{
"name": "24754",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24754"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "25402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25402"
},
{
"name": "RHSA-2007:0124",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=171452",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"name": "25989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25989"
},
{
"name": "24604",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24604"
},
{
"name": "oval:org.mitre.oval:def:10658",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"name": "SUSE-SA:2007:040",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"name": "25931",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25931"
},
{
"name": "DSA-1274",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"name": "24617",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24617"
},
{
"name": "openbsd-file-bo(36283)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"name": "ADV-2007-1040",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"name": "25133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25133"
},
{
"name": "FreeBSD-SA-07:04",
"refsource": "FREEBSD",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"name": "USN-439-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"name": "NetBSD-SA2008-001",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"name": "VU#606700",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"name": "24608",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24608"
},
{
"name": "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"name": "GLSA-200703-26",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"name": "GLSA-200710-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"name": "24548",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24548"
},
{
"name": "24592",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24592"
},
{
"name": "https://issues.rpath.com/browse/RPL-1148",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"name": "SSA:2007-093-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:file:file:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.19",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1536"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[file] 20070302 file-4.20 is now available",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=171452",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"name": "24548",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24548"
},
{
"name": "https://issues.rpath.com/browse/RPL-1148",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"name": "RHSA-2007:0124",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"name": "USN-439-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"name": "VU#606700",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"name": "23021",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/23021"
},
{
"name": "1017796",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1017796"
},
{
"name": "24604",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24604"
},
{
"name": "24616",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24616"
},
{
"name": "24617",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24617"
},
{
"name": "24592",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24592"
},
{
"name": "GLSA-200703-26",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"name": "24608",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24608"
},
{
"name": "DSA-1274",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"name": "SUSE-SR:2007:005",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"name": "24723",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24723"
},
{
"name": "SSA:2007-093-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
},
{
"name": "24754",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24754"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"name": "25133",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25133"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"tags": [],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "FreeBSD-SA-07:04",
"refsource": "FREEBSD",
"tags": [],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"name": "GLSA-200710-19",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"name": "MDKSA-2007:067",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"name": "[4.0] 20070709 015: SECURITY FIX: July 9, 2007",
"refsource": "OPENBSD",
"tags": [],
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"name": "SUSE-SA:2007:040",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"name": "25393",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25393"
},
{
"name": "25402",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "25931",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25931"
},
{
"name": "25989",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25989"
},
{
"name": "27307",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27307"
},
{
"name": "27314",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27314"
},
{
"name": "NetBSD-SA2008-001",
"refsource": "NETBSD",
"tags": [],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"
},
{
"name": "29179",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29179"
},
{
"name": "ADV-2007-1040",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "openbsd-file-bo(36283)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"name": "oval:org.mitre.oval:def:10658",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"name": "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"name": "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2018-10-16T16:38Z",
"publishedDate": "2007-03-20T20:19Z"
}
}
}
GHSA-H28W-VFJ4-VH5J
Vulnerability from github – Published: 2022-05-03 03:18 – Updated: 2022-05-03 03:18Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
{
"affected": [],
"aliases": [
"CVE-2007-1536"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-03-20T20:19:00Z",
"severity": "HIGH"
},
"details": "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.",
"id": "GHSA-h28w-vfj4-vh5j",
"modified": "2022-05-03T03:18:06Z",
"published": "2022-05-03T03:18:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1536"
},
{
"type": "WEB",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=171452"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1148"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"type": "WEB",
"url": "http://mx.gw.com/pipermail/file/2007/000161.html"
},
{
"type": "WEB",
"url": "http://openbsd.org/errata40.html#015_file"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24548"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24592"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24604"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24608"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24616"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24617"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24723"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24754"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25133"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25393"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25402"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25931"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25989"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27307"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27314"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29179"
},
{
"type": "WEB",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200703-26.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200710-19.xml"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.512926"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1274"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/606700"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_40_file.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0124.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/477861/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/477950/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/23021"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1017796"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-439-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1040"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1939"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.