+++ This bug was initially created as a clone of Bug #152865 +++ 04.48.16 CVE: Not Available Platform: Unix Title: File ELF Header Unspecified Buffer Overflow Description: The Unix file command is affected by a buffer overflow vulnerability. This issue is due to a failure of the application to properly validate string lengths in the affected files prior to copying them into static process buffers. This can be leveraged by an attacker to execute hostile code on the vulnerable system. Ref: http://www.securityfocus.com/advisories/7566 ------- Additional Comments From bugzilla.fedora.us 2004-12-14 08:40:43 ---- gentoo has an advisory on it, now, too: http://www.gentoo.org/security/en/glsa/glsa-200412-07.xml <snip> All versions of RHEL seem to be affected.
This was discussed by vendor-sec and found to be a non-issue. A number of patches were added to correct issues in file. The implications of these issues is that a malformed ELF binary could cause an error, or in the worst case a crash during operation. The flaws were not found to be exploitable.