{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-1536", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Integer underflow in the file_printf function in the \"file\" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070825 OpenBSD 4.1 - Heap overflow vulnerabillity", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/477861/100/0/threaded" }, { "name" : "20070828 Re: OpenBSD 4.1 - Heap overflow vulnerabillity", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/477950/100/0/threaded" }, { "name" : "[file] 20070302 file-4.20 is now available", "refsource" : "MLIST", "url" : "http://mx.gw.com/pipermail/file/2007/000161.html" }, { "name" : "https://bugs.gentoo.org/show_bug.cgi?id=171452", "refsource" : "CONFIRM", "url" : "https://bugs.gentoo.org/show_bug.cgi?id=171452" }, { "name" : "https://issues.rpath.com/browse/RPL-1148", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-1148" }, { "name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm", "refsource" : "CONFIRM", "url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm" }, { "name" : "http://docs.info.apple.com/article.html?artnum=305530", "refsource" : "CONFIRM", "url" : "http://docs.info.apple.com/article.html?artnum=305530" }, { "name" : "APPLE-SA-2007-05-24", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html" }, { "name" : "DSA-1274", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2007/dsa-1274" }, { "name" : "FreeBSD-SA-07:04", "refsource" : "FREEBSD", "url" : "http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc" }, { "name" : "GLSA-200703-26", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200703-26.xml" }, { "name" : "GLSA-200710-19", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200710-19.xml" }, { "name" : "MDKSA-2007:067", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:067" }, { "name" : "NetBSD-SA2008-001", "refsource" : "NETBSD", "url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc" }, { "name" : "[4.0] 20070709 015: SECURITY FIX: July 9, 2007", "refsource" : "OPENBSD", "url" : "http://openbsd.org/errata40.html#015_file" }, { "name" : "RHSA-2007:0124", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0124.html" }, { "name" : "SSA:2007-093-01", "refsource" : "SLACKWARE", "url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.512926" }, { "name" : "SUSE-SR:2007:005", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2007_5_sr.html" }, { "name" : "SUSE-SA:2007:040", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2007_40_file.html" }, { "name" : "USN-439-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-439-1" }, { "name" : "VU#606700", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/606700" }, { "name" : "23021", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/23021" }, { "name" : "oval:org.mitre.oval:def:10658", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658" }, { "name" : "ADV-2007-1040", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/1040" }, { "name" : "ADV-2007-1939", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/1939" }, { "name" : "1017796", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1017796" }, { "name" : "24548", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24548" }, { "name" : "24604", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24604" }, { "name" : "24616", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24616" }, { "name" : "24617", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24617" }, { "name" : "24592", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24592" }, { "name" : "24608", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24608" }, { "name" : "24723", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24723" }, { "name" : "24754", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24754" }, { "name" : "25133", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25133" }, { "name" : "25393", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25393" }, { "name" : "25402", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25402" }, { "name" : "25931", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25931" }, { "name" : "25989", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25989" }, { "name" : "27307", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27307" }, { "name" : "27314", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27314" }, { "name" : "29179", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29179" }, { "name" : "openbsd-file-bo(36283)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36283" } ] } }