Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
Name | Vendor | Start Version | End Version |
---|---|---|---|
File | File | 3.28 (including) | 3.28 (including) |
File | File | 3.30 (including) | 3.30 (including) |
File | File | 3.32 (including) | 3.32 (including) |
File | File | 3.33 (including) | 3.33 (including) |
File | File | 3.34 (including) | 3.34 (including) |
File | File | 3.35 (including) | 3.35 (including) |
File | File | 3.36 (including) | 3.36 (including) |
File | File | 3.37 (including) | 3.37 (including) |
File | File | 3.39 (including) | 3.39 (including) |
File | File | 3.40 (including) | 3.40 (including) |