Integer underflow in the file_printf function in the file program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
File | File | * | 4.19 (including) |
Red Hat Enterprise Linux 4 | RedHat | file-0:4.10-3.EL4.5 | * |
Red Hat Enterprise Linux 5 | RedHat | file-0:4.17-9.el5 | * |
File | Ubuntu | dapper | * |
File | Ubuntu | edgy | * |
File | Ubuntu | feisty | * |
File | Ubuntu | upstream | * |