7 lines
No EOL
557 B
Text
Executable file
7 lines
No EOL
557 B
Text
Executable file
source: http://www.securityfocus.com/bid/11771/info
|
|
|
|
The file command is affected by a buffer overflow vulnerability. This issue is due to a failure of the application to properly validate string lengths in the affected file prior to copying them into static process buffers.
|
|
|
|
An attacker may leverage this issue to execute arbitrary code with the privileges of a user that processes the malicious file with the affected utility. This may be leveraged to escalate privileges or to gain unauthorized access.
|
|
|
|
http://www.exploit-db.com/sploits/24784.zip |