Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
file file 3.30 |
||
file file 3.32 |
||
file file 3.28 |
||
file file 3.37 |
||
file file 3.39 |
||
file file 3.40 |
||
file file 3.33 |
||
file file 3.34 |
||
file file 3.35 |
||
file file 3.36 |
||
netbsd netbsd 1.5 |
||
netbsd netbsd 1.5.1 |
||
netbsd netbsd 1.5.2 |
||
netbsd netbsd 1.5.3 |
||
netbsd netbsd 1.6 |