LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Moderate: file security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux An updated file package that fixes a security flaw is now available for Red Hat Enterprise Linux 4 and 5.This update has been rated as having moderate security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: file security update
Advisory ID:       RHSA-2007:0124-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0124.html
Issue date:        2007-03-23
Updated on:        2007-03-23
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1536 
- ---------------------------------------------------------------------

1. Summary:

An updated file package that fixes a security flaw is now available for Red
Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The file command is used to identify a particular file according to the
type of data contained by the file.

An integer underflow flaw was found in the file utility.  An attacker could
create a carefully crafted file which, if examined by a victim using the
file utility, could lead to arbitrary code execution. (CVE-2007-1536)

This issue did not affect the version of the file utility distributed with
Red Hat Enterprise Linux 2.1 or 3.

Users should upgrade to this erratum package, which contain a backported
patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

233161 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution
233337 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

ppc:
4ff799e23850ad56b777c3213b5897b3  file-4.10-3.EL4.5.ppc.rpm
5e8256aa72a078d8a236ade85838000e  file-debuginfo-4.10-3.EL4.5.ppc.rpm

s390:
947e89850ecd9f3e218a86b31060bbff  file-4.10-3.EL4.5.s390.rpm
c9b44db20a5f0f3ef326e13ab8e91416  file-debuginfo-4.10-3.EL4.5.s390.rpm

s390x:
238b84277df82e589e2da1c080390391  file-4.10-3.EL4.5.s390x.rpm
afbd86c4b660e26cf5a855834978453e  file-debuginfo-4.10-3.EL4.5.s390x.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a  file-4.17-9.el5.src.rpm

i386:
d044793730b6eb50f99f89e250ff1f68  file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55  file-debuginfo-4.17-9.el5.i386.rpm

x86_64:
7d76d229b35d23af0ab593322c49c1b6  file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb  file-debuginfo-4.17-9.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a  file-4.17-9.el5.src.rpm

i386:
d044793730b6eb50f99f89e250ff1f68  file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55  file-debuginfo-4.17-9.el5.i386.rpm

ia64:
ec120e826901810a56d962483b02612a  file-4.17-9.el5.ia64.rpm
a7ec74f8c96a2e219eac81c96d0d3325  file-debuginfo-4.17-9.el5.ia64.rpm

ppc:
9fe5754f3933494b9c973e30d570ff77  file-4.17-9.el5.ppc.rpm
29883718c7ce2a2b404647f0104c9f29  file-debuginfo-4.17-9.el5.ppc.rpm

s390x:
798d452831a511b2145aeb4ab21b66d3  file-4.17-9.el5.s390x.rpm
dfe62528bfa601ee08bece711f0263b5  file-debuginfo-4.17-9.el5.s390x.rpm

x86_64:
7d76d229b35d23af0ab593322c49c1b6  file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb  file-debuginfo-4.17-9.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.