Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-2799

Опубликовано: 23 мая 2007
Источник: redhat
EPSS Низкий

Описание

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190

EPSS

Процентиль: 87%
0.03354
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

nvd
больше 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

debian
больше 18 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit sy ...

github
больше 3 лет назад

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

oracle-oval
больше 18 лет назад

ELSA-2007-0391: Moderate: file security update (MODERATE)

EPSS

Процентиль: 87%
0.03354
Низкий