CVE-2019-18218

Summary

CVECVE-2019-18218
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2019-10-21 05:15:00 UTC
Updated2023-11-07 03:06:00 UTC
Descriptioncdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).

Risk And Classification

Problem Types: CWE-787

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 12.04 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 18.04 All All All
Operating System Canonical Ubuntu Linux 19.04 All All All
Operating System Canonical Ubuntu Linux 19.10 All All All
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Fedoraproject Fedora 29 All All All
Operating System Fedoraproject Fedora 30 All All All
Operating System Fedoraproject Fedora 31 All All All
Application File Project File All All All All
Application Netapp Active Iq Unified Manager All All All All
Operating System Opensuse Leap 15.1 All All All

References

ReferenceSourceLinkTags
USN-4172-2: file vulnerability | Ubuntu security notices UBUNTU usn.ubuntu.com
[security-announce] openSUSE-SU-2020:0677-1: moderate: Security update f SUSE lists.opensuse.org
Debian -- Security Information -- DSA-4550-1 file DEBIAN www.debian.org
USN-4172-1: file vulnerability | Ubuntu security notices UBUNTU usn.ubuntu.com
[SECURITY] [DLA 2708-1] php7.0 security update MLIST lists.debian.org
[SECURITY] [DLA 1969-1] file security update MLIST lists.debian.org Third Party Advisory
[SECURITY] Fedora 31 Update: file-5.37-8.fc31 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
16780 - oss-fuzz - OSS-Fuzz: Fuzzing the planet - Monorail MISC bugs.chromium.org Exploit, Issue Tracking, Third Party Advisory
file: Heap-based buffer overflow (GLSA 202003-24) — Gentoo security GENTOO security.gentoo.org
[SECURITY] Fedora 29 Update: file-5.34-15.fc29 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
Limit the number of elements in a vector (found by oss-fuzz) · file/file@46a8443 · GitHub MISC github.com Patch, Third Party Advisory
[SECURITY] Fedora 31 Update: file-5.37-8.fc31 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
[SECURITY] Fedora 30 Update: file-5.36-5.fc30 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
[SECURITY] Fedora 30 Update: file-5.36-5.fc30 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
[SECURITY] Fedora 29 Update: file-5.34-15.fc29 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
CVE-2019-18218 File Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159498 Oracle Enterprise Linux Security Update for file (ELSA-2021-4374)
  • 178707 Debian Security Update for php7.0 (DLA 2708-1)
  • 239799 Red Hat Update for file (RHSA-2021:4374)
  • 296078 Oracle Solaris 11.4 Support Repository Update (SRU) 16.4.0 Missing (CPUOCT2019)
  • 357069 Amazon Linux Security Advisory for php73 : ALAS-2024-1918
  • 357212 Amazon Linux Security Advisory for php72 : ALAS-2024-1921
  • 500183 Alpine Linux Security Update for file
  • 503922 Alpine Linux Security Update for file
  • 671084 EulerOS Security Update for file (EulerOS-SA-2019-2449)
  • 751081 SUSE Enterprise Linux Security Update for file (SUSE-SU-2021:2930-1)
  • 940009 AlmaLinux Security Update for file (ALSA-2021:4374)
  • 960284 Rocky Linux Security Update for file (RLSA-2021:4374)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report