You are here
Home > Preporuke > Ranjivosti programskog paketa file

Ranjivosti programskog paketa file

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2278-1
July 15, 2014

file vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 13.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

File could be made to crash or hang if it processed specially crafted data.

Software Description:
– file: Tool to determine file types

Details:

Mike Frysinger discovered that the file awk script detector used multiple
wildcard with unlimited repetitions. An attacker could use this issue to
cause file to consume resources, resulting in a denial of service.
(CVE-2013-7345)

Francisco Alonso discovered that file incorrectly handled certain CDF
documents. A attacker could use this issue to cause file to hang or crash,
resulting in a denial of service. (CVE-2014-0207, CVE-2014-3478,
CVE-2014-3479, CVE-2014-3480, CVE-2014-3487)

Jan Kaluža discovered that file did not properly restrict the amount of
data read during regex searches. An attacker could use this issue to
cause file to consume resources, resulting in a denial of service.
(CVE-2014-3538)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
file 1:5.14-2ubuntu3.1
libmagic1 1:5.14-2ubuntu3.1

Ubuntu 13.10:
file 5.11-2ubuntu4.3
libmagic1 5.11-2ubuntu4.3

Ubuntu 12.04 LTS:
file 5.09-2ubuntu0.4
libmagic1 5.09-2ubuntu0.4

Ubuntu 10.04 LTS:
file 5.03-5ubuntu1.3
libmagic1 5.03-5ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2278-1
CVE-2013-7345, CVE-2014-0207, CVE-2014-3478, CVE-2014-3479,
CVE-2014-3480, CVE-2014-3487, CVE-2014-3538

Package Information:
https://launchpad.net/ubuntu/+source/file/1:5.14-2ubuntu3.1
https://launchpad.net/ubuntu/+source/file/5.11-2ubuntu4.3
https://launchpad.net/ubuntu/+source/file/5.09-2ubuntu0.4
https://launchpad.net/ubuntu/+source/file/5.03-5ubuntu1.3

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=0XQd
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-07-0001-ADV
CveCVE-2013-7345 CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3538
ID izvornikaUSN-2278-1
Proizvodfile
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost programskog paketa ror40-rubygem-activerecord

Otkrivena je ranjivost umetanja proizvoljnog SQL koda unutar datoteke activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb uzrokovana neodgovarajućim upravljanjem "quote" vrijednosti "range" tipa atributa. Uspješno iskorištavanje...

Close