CVE-2007-2799
Summary
| CVE | CVE-2007-2799 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-23 21:30:00 UTC |
| Updated | 2018-10-16 16:45:00 UTC |
| Description | Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536. |
Risk And Classification
Problem Types: CWE-189
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | File | File | 4.2 | All | All | All |
| Application | File | File | 4.2 | All | All | All |
| Application | Sleuth Kit | The Sleuth Kith | All | All | All | All |
| Application | Sleuth Kit | The Sleuth Kith | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 241022 – (CVE-2007-2799) CVE-2007-2799 file integer overflow | CONFIRM | bugzilla.redhat.com | Vendor Advisory |
| About Security Update 2008-002 | CONFIRM | docs.info.apple.com | |
| ASA-2007-290 (RHSA-2007-0391) | CONFIRM | support.avaya.com | |
| Mandriva update for file - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| NetBSD file "file_printf()" Integer Underflow Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | |
| Trustix Update for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| Webmail - OVH | VUPEN | www.vupen.com | Vendor Advisory |
| Amavis file Integer Underflow and Denial of Service - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| issues.rpath.com/browse/RPL-1311 | CONFIRM | issues.rpath.com | |
| Security Announcement | SUSE | www.novell.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Debian -- Security Information -- DSA-1343-1 file | DEBIAN | www.debian.org | |
| Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Vendor Advisory |
| 404 Not Found | CONFIRM | www.amavis.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| SecurityTracker.com Archives - file Integer Overflow in file_printf() May Let Local Users Execute Arbitrary Code | SECTRACK | www.securitytracker.com | |
| Support | REDHAT | www.redhat.com | |
| USN-439-2: file vulnerability | Ubuntu | UBUNTU | www.ubuntu.com | |
| Avaya Products file "file_printf()" Integer Underflow Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| SUSE update for file - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Gentoo Linux Documentation -- file: Integer overflow | GENTOO | www.gentoo.org | |
| Support / Security / Advisories / / MDKSA-2007:114 | Mandriva | MANDRIVA | www.mandriva.com | |
| rPath update for file - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| NetBSD-SA2008-001 | NETBSD | ftp.netbsd.org | |
| File Multiple Denial of Service Vulnerabilities | BID | www.securityfocus.com | |
| Debian update for file - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| 38498 | OSVDB | osvdb.org | |
| APPLE-SA-2008-03-18 Security Update 2008-002 | APPLE | lists.apple.com | |
| 2007-0024 | TRUSTIX | www.trustix.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.