Debian: file Buffer overflow vulnerability

    Date13 Mar 2003
    CategoryDebian
    2297
    Posted ByLinuxSecurity Advisories
    A buffer overflow vulnerability in the ELF formatparsing of the "file" command, one which can be used to executearbitrary code with the privileges of the user running the command has been fixed.
    
    ----------------------------------------------------------------------------
    Debian Security Advisory DSA-260-1                       This email address is being protected from spambots. You need JavaScript enabled to view it.
    	 
    http://www.debian.org/security/                                Michael Stone
    March 13, 2003                             http://www.debian.org/security/faq
    ----------------------------------------------------------------------------
    
    Package: file
    Vulnerability: buffer overflow
    Debian-specific: no
    CVE Id: CAN-2003-0102
    
    iDEFENSE discovered a buffer overflow vulnerability in the ELF format
    parsing of the "file" command, one which can be used to execute
    arbitrary code with the privileges of the user running the command. The
    vulnerability can be exploited by crafting a special ELF binary which is
    then input to file. This could be accomplished by leaving the binary on
    the file system and waiting for someone to use file to identify it, or
    by passing it to a service that uses file to classify input. (For
    example, some printer filters run file to determine how to process input
    going to a printer.)
    
    Fixed packages are available in version 3.28-1.potato.1 for Debian 2.2
    (potato) and version 3.37-3.1.woody.1 for Debian 3.0 (woody). We
    recommend you upgrade your file package immediately.
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    
    Debian 2.2 (potato)
    ----------------------
    
      Debian 2.2 (potato) was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1.dsc
          Size/MD5 checksum:      639 85bbfb52d13c084a9029f3552d7e1dfe
         http://security.debian.org/pool/updates/main/f/file/file_3.28.orig.tar.gz
          Size/MD5 checksum:   124529 a6bdc66e9c6af58da6977a57923c02c0
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1.diff.gz
          Size/MD5 checksum:    31736 9c23fac99161cc9a5e133be542fe0226
    
      alpha architecture (DEC Alpha)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_alpha.deb
          Size/MD5 checksum:    92170 18bdf5775e40243e7e17ebac7dbed730
    
      arm architecture (ARM)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_arm.deb
          Size/MD5 checksum:    88572 c51e09397b04358ab7e42c710dab4ca9
    
      i386 architecture (Intel ia32)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_i386.deb
          Size/MD5 checksum:    88164 9a1945e7449e5bc243fd22af2cfb15a2
    
      m68k architecture (Motorola Mc680x0)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_m68k.deb
          Size/MD5 checksum:    87186 1348a858e3715d25c862648c41ac793f
    
      powerpc architecture (PowerPC)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_powerpc.deb
          Size/MD5 checksum:    89346 b7190fd329df08377dc922d014d46195
    
      sparc architecture (Sun SPARC/UltraSPARC)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.28-1.potato.1_sparc.deb
          Size/MD5 checksum:    91412 032448fa4cf7b4bc4d8ce3bbe7470a3f
    
    Debian 3.0 (woody)
    -------------------
    
      Debian 3.0 (woody) was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1.diff.gz
          Size/MD5 checksum:    47683 5653fa12fb92b465017b7fb847591bc5
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1.dsc
          Size/MD6 checksum:      678 9e5705581862d737a338471bfa031617
         http://security.debian.org/pool/updates/main/f/file/file_3.37.orig.tar.gz
          Size/MD5 checksum:   166623 5743b2fc24743b6188504762d40c0b4c
    
      alpha architecture (DEC Alpha)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_alpha.deb
          Size/MD5 checksum:   180780 814139b8680577450d416fb386737d56
    
      arm architecture (ARM)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_arm.deb
          Size/MD5 checksum:   177040 b49fb60a60641cf5e27dea7b44338938
    
      hppa architecture (HP PA RISC)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_hppa.deb
          Size/MD5 checksum:   179412 2388427c4f52ca11e2ac00b0d12e1b42
    
      i386 architecture (Intel ia32)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_i386.deb
          Size/MD5 checksum:   175246 ebac35a75aebe97cad2ebbfffe000f82
    
      ia64 architecture (Intel ia64)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_ia64.deb
          Size/MD5 checksum:   184942 934d1a23acd4e343e390ebed66f2101e
    
      m68k architecture (Motorola Mc680x0)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_m68k.deb
          Size/MD5 checksum:   174058 69c08b32893304e1a821793ecf193393
    
      mips architecture (MIPS (Big Endian))
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_mips.deb
          Size/MD5 checksum:   178576 f913464347dde9972ec2c80b29393f6b
    
      mipsel architecture (MIPS (Little Endian))
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_mipsel.deb
          Size/MD5 checksum:   178460 0ce50ff45b9db314a737c8002e3bcb9c
    
      powerpc architecture (PowerPC)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_powerpc.deb
          Size/MD5 checksum:   177072 f43bc712f83b2cad0e4f3e40b1d491e7
    
      s390 architecture (IBM S/390)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_s390.deb
          Size/MD5 checksum:   177980 305395cc6fed6830697b7f39984d01d3
    
      sparc architecture (Sun SPARC/UltraSPARC)
    
         http://security.debian.org/pool/updates/main/f/file/file_3.37-3.1.woody.1_sparc.deb
          Size/MD5 checksum:   179316 b957e930f657cd1674ef66a38ae2dbb0
    
    ----------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.