Vulnerabilities
Vulnerable Software
File:  >> File  Security Vulnerabilities
Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
CVSS Score
5.1
EPSS Score
0.028
Published
2007-05-23
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
CVSS Score
9.3
EPSS Score
0.396
Published
2007-03-20
Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.
CVSS Score
10.0
EPSS Score
0.057
Published
2005-01-10
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
CVSS Score
4.6
EPSS Score
0.083
Published
2003-03-18


Contact Us

Shodan ® - All rights reserved