
CVE-2007-2026 – Gentoo Linux Security Advisory 201412-11
https://notcve.org/view.php?id=CVE-2007-2026
13 Apr 2007 — The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS. El código regular de la expresión de gnu en el archivo 4.20 permite a atacantes dependientes del contexto provocar denegación de servicio (consumo de CPU) a través de documentos manipulados con un gran n... • http://secunia.com/advisories/24918 •

CVE-2007-1536 – File 4.13 - Command File_PrintF Integer Underflow
https://notcve.org/view.php?id=CVE-2007-1536
20 Mar 2007 — Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. Un subdesbordamiento de enteros en la función file_printf en el programa "file" anterior a versión 4.20, permite a los atacantes asistidos por el usuario ejecutar código arbitrario por medio de un archivo que desencadena un desbordamiento de búfer en la región heap de la memoria. Multiple vulnerabilities have been foun... • https://www.exploit-db.com/exploits/29753 • CWE-189: Numeric Errors •

CVE-2004-1304 – File ELF 4.x - Header Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1304
22 Dec 2004 — Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file. • https://www.exploit-db.com/exploits/24784 •

CVE-2003-0102 – File 3.x - Local Stack Overflow Code Execution
https://notcve.org/view.php?id=CVE-2003-0102
18 Mar 2003 — Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize). • https://www.exploit-db.com/exploits/22324 •