Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0391

Опубликовано: 30 мая 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0391: Moderate: file security update (MODERATE)

[4.10-3.0.2]

  • resolves: #241026: CVE-2007-2799 file integer overflow
  • added dependency on zlib-devel

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

file

4.17-9.0.1.el5

Oracle Linux i386

file

4.17-9.0.1.el5

Связанные CVE

Связанные уязвимости

ubuntu
около 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

redhat
около 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

nvd
около 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

debian
около 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit sy ...

github
около 3 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.