5.5
CVSSv3

CVE-2022-48554

Published: 22/08/2023 Updated: 13/03/2024
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

File prior to 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

Vulnerable Product Search on Vulmon Subscribe to Product

file project file 5.41

debian debian linux 11.0

Vendor Advisories

A buffer overflow was found in file, a file type classification tool, which may result in denial of service if a specially crafted file is processed For the oldstable distribution (bullseye), this problem has been fixed in version 1:539-3+deb11u1 We recommend that you upgrade your file packages For the detailed security status of file please re ...
DescriptionThe MITRE CVE dictionary describes this issue as: File before 543 has an stack-based buffer over-read in file_copystr in funcsc NOTE: "File" is the name of an Open Source project ...
About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security releases page Apple security documents reference vulnerabilities by CVE-ID whe ...
About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security releases page Apple security documents reference vulnerabilities by CVE-ID whe ...
About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security releases page Apple security documents reference vulnerabilities by CVE-ID whe ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-03-07-2024-6 tvOS 174 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Product Security vi ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-03-07-2024-2 macOS Sonoma 144 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Product Sec ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-03-07-2024-5 watchOS 104 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Product Security ...