Description
An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793
Patch, Third Party Advisory x_refsource_confirm
https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3965
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201710-02
Scores
CVSS v3
5.5
EPSS
0.0014
EPSS Percentile
33.3%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-119
Status
published
Products (1)
file_project/file
5.29
Published
Sep 11, 2017
Tracked Since
Feb 18, 2026