First published: Wed May 23 2007(Updated: )
Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
File File | =4.2 | |
Sleuth Kit The Sleuth Kith |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2799 has a moderate severity level due to the potential for arbitrary code execution.
To fix CVE-2007-2799, update the "file" program to a version greater than 4.20 that addresses the integer overflow vulnerability.
CVE-2007-2799 primarily affects the "file" program version 4.20 on 32-bit systems.
CVE-2007-2799 requires user assistance for exploitation, typically through opening a maliciously crafted large file.
CVE-2007-2799 impacts software products like The Sleuth Kit that utilize the vulnerable "file" program version 4.20.