SB2019031823 - Stack-based buffer overflow in file (Alpine package)
Published: March 18, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2019-8907)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to stack-based buffer overflow in the do_core_note function. A remote attacker can trick the victim into executing a file that submits malicious input to the targeted system with the file command, trigger memory corruption and perform a denial of service attack.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=61e481480f83fcb6df33de7da9d782f0c229e945
- https://git.alpinelinux.org/aports/commit/?id=e417e312a2460b385bd5003089c29af549f19b14
- https://git.alpinelinux.org/aports/commit/?id=8b903beb77c68c97ba0aa36e58b6750edc06ca78
- https://git.alpinelinux.org/aports/commit/?id=27d87cf2365bff16337278a4e93a16df7f33f2e4