Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-48554

Опубликовано: 21 янв. 2022
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

A flaw was found in file, a program used to identify a particular file according to the type of data contained by the file. This issue occurs when processing a specially crafted file, causing a stack-based buffer over-read, resulting in an application crash.

Меры по смягчению последствий

Do not process untrusted files with the file program.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6fileOut of support scope
Red Hat Enterprise Linux 7fileOut of support scope
Red Hat Enterprise Linux 8fileNot affected
Red Hat Enterprise Linux 9fileFixedRHSA-2024:251230.04.2024
Red Hat Enterprise Linux 9fileFixedRHSA-2024:251230.04.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2235714file: stack-based buffer over-read in file_copystr in funcs.c

EPSS

Процентиль: 3%
0.00019
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 2 года назад

File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

CVSS3: 5.5
nvd
почти 2 года назад

File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

CVSS3: 5.5
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 5.5
debian
почти 2 года назад

File before 5.43 has an stack-based buffer over-read in file_copystr i ...

rocky
больше 1 года назад

Low: file security update

EPSS

Процентиль: 3%
0.00019
Низкий

5.5 Medium

CVSS3