USN-2278-1: file vulnerabilities
15 July 2014
File could be made to crash or hang if it processed specially crafted data.
Releases
Packages
- file - Tool to determine file types
Details
Mike Frysinger discovered that the file awk script detector used multiple
wildcard with unlimited repetitions. An attacker could use this issue to
cause file to consume resources, resulting in a denial of service.
(CVE-2013-7345)
Francisco Alonso discovered that file incorrectly handled certain CDF
documents. A attacker could use this issue to cause file to hang or crash,
resulting in a denial of service. (CVE-2014-0207, CVE-2014-3478,
CVE-2014-3479, CVE-2014-3480, CVE-2014-3487)
Jan Kaluža discovered that file did not properly restrict the amount of
data read during regex searches. An attacker could use this issue to
cause file to consume resources, resulting in a denial of service.
(CVE-2014-3538)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
Ubuntu 13.10
Ubuntu 12.04
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.
Related notices
- USN-2276-1: php5-intl, php5-curl, php5-tidy, php5-sqlite, php5-pspell, libapache2-mod-php5, php5-recode, php5, php5-common, php5-enchant, php-pear, php5-ldap, php5-cgi, php5-gmp, php5-mysqlnd, php5-sybase, php5-xsl, php5-odbc, php5-pgsql, php5-dev, php5-readline, php5-fpm, php5-snmp, php5-cli, php5-xmlrpc, libphp5-embed, php5-mysql, libapache2-mod-php5filter, php5-gd