Page 2 of 9 results (0.002 seconds)

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 2

file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference. archivo antes de v5.11 y libmagic permite a atacantes remotos provocar una denegación de servicio (caída) a través de un archivo de documento elaborado compuesto (CDF) que activa (1) una lectura fuera de límites o (2) una desreferencia de puntero no válido. A denial of service flaw was found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file. • http://mx.gw.com/pipermail/file/2012/000914.html http://www.debian.org/security/2012/dsa-2422 http://www.mandriva.com/security/advisories?name=MDVSA-2012:035 http://www.ubuntu.com/usn/USN-2123-1 https://github.com/glensc/file/commit/1859fdb4e67c49c463c4e0078054335cd46ba295 https://github.com/glensc/file/commit/1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b https://access.redhat.com/security/cve/CVE-2012-1571 https://bugzilla.redhat.com/show_bug.cgi?id=805197 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 9.3EPSS: 0%CPEs: 35EXPL: 0

Multiple integer overflows in Christos Zoulas file before 5.02 allow user-assisted remote attackers to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow. Múltiples desbordamiento de búfer en Christos Zoulas file before v5.02 permite a atacantes asistidos remotamente por usuarios tienen un impacto no especificado a través de un componente de documento manipulado (como cdf) archivo que provoca un desbordamiento de búfer. • http://mx.gw.com/pipermail/file/2009/000382.html http://www.securityfocus.com/bid/37074 • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 12%CPEs: 1EXPL: 1

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en montículo en la función cdf_read_sat en src/cdf.c en Christos Zoulas file v5.00, permite a atacantes remotos asistidos por usuarios ejecutar código se su elección a través de un componente del fichero de documentación manipulado, como se demuestra por ficheros .msi, .doc o .mpp. NOTA: algunos de estos detalles se han obtenido de terceras partes. • ftp://ftp.astron.com/pub/file/file-5.01.tar.gz http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515603 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525820 http://mx.gw.com/pipermail/file/2009/000379.html http://secunia.com/advisories/34881 http://www.mandriva.com/security/advisories?name=MDVSA-2009:129 http://www.osvdb.org/54100 http://www.securityfocus.com/bid/34745 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package before 3.41, related to "a memory allocation problem," has unknown impact. • https://www.exploit-db.com/exploits/22326 http://www.kb.cert.org/vuls/id/100937 http://www.securityfocus.com/archive/1/313847 http://www.securityfocus.com/bid/7009 https://exchange.xforce.ibmcloud.com/vulnerabilities/11488 •