First published: Wed Dec 22 2004(Updated: )
Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
File File | =4.7 | |
File File | =4.5 | |
File File | =4.4 | |
File File | =4.1 | |
File File | =4.10 | |
File File | =4.2 | |
File File | =4.9 | |
File File | =4.6 | |
File File | =4.3 | |
File File | =4.8 | |
File File | =4.0 | |
File File | =4.11 | |
Trustix Secure Linux | =2.0 | |
Trustix Secure Linux | =2.1 | |
Trustix Secure Linux | =2.2 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1304 is classified as a high-severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2004-1304, update to a patched version of the 'file' utility that is newer than 4.12.
CVE-2004-1304 affects multiple versions of the 'file' utility including versions 4.0 through 4.11.
CVE-2004-1304 is a stack-based buffer overflow vulnerability that occurs in the ELF header parsing code.
Yes, CVE-2004-1304 can be exploited remotely by delivering a crafted ELF file to the vulnerable system.