Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0194 -- [UNIX/Linux][RedHat] Moderate: file security update 26 March 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: file Publisher: Red Hat Operating System: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2007-1536 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0124.html http://mx.gw.com/pipermail/file/2007/000161.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running the file utility check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: file security update Advisory ID: RHSA-2007:0124-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0124.html Issue date: 2007-03-23 Updated on: 2007-03-23 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-1536 - - --------------------------------------------------------------------- 1. Summary: An updated file package that fixes a security flaw is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: The file command is used to identify a particular file according to the type of data contained by the file. An integer underflow flaw was found in the file utility. An attacker could create a carefully crafted file which, if examined by a victim using the file utility, could lead to arbitrary code execution. (CVE-2007-1536) This issue did not affect the version of the file utility distributed with Red Hat Enterprise Linux 2.1 or 3. Users should upgrade to this erratum package, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 233161 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution 233337 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm i386: 2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm 8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm ia64: 4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm ppc: 4ff799e23850ad56b777c3213b5897b3 file-4.10-3.EL4.5.ppc.rpm 5e8256aa72a078d8a236ade85838000e file-debuginfo-4.10-3.EL4.5.ppc.rpm s390: 947e89850ecd9f3e218a86b31060bbff file-4.10-3.EL4.5.s390.rpm c9b44db20a5f0f3ef326e13ab8e91416 file-debuginfo-4.10-3.EL4.5.s390.rpm s390x: 238b84277df82e589e2da1c080390391 file-4.10-3.EL4.5.s390x.rpm afbd86c4b660e26cf5a855834978453e file-debuginfo-4.10-3.EL4.5.s390x.rpm x86_64: ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm i386: 2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm 8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm x86_64: ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm i386: 2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm 8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm ia64: 4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm x86_64: ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm i386: 2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm 8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm ia64: 4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm x86_64: ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/file-4.17-9.el5.src.rpm 565e3adeb330d941e62779e973043c8a file-4.17-9.el5.src.rpm i386: d044793730b6eb50f99f89e250ff1f68 file-4.17-9.el5.i386.rpm 3e6bccacfabae8a111b4d50d9a18ce55 file-debuginfo-4.17-9.el5.i386.rpm x86_64: 7d76d229b35d23af0ab593322c49c1b6 file-4.17-9.el5.x86_64.rpm 99ca293ef9794b8708f7380e6627a8fb file-debuginfo-4.17-9.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/file-4.17-9.el5.src.rpm 565e3adeb330d941e62779e973043c8a file-4.17-9.el5.src.rpm i386: d044793730b6eb50f99f89e250ff1f68 file-4.17-9.el5.i386.rpm 3e6bccacfabae8a111b4d50d9a18ce55 file-debuginfo-4.17-9.el5.i386.rpm ia64: ec120e826901810a56d962483b02612a file-4.17-9.el5.ia64.rpm a7ec74f8c96a2e219eac81c96d0d3325 file-debuginfo-4.17-9.el5.ia64.rpm ppc: 9fe5754f3933494b9c973e30d570ff77 file-4.17-9.el5.ppc.rpm 29883718c7ce2a2b404647f0104c9f29 file-debuginfo-4.17-9.el5.ppc.rpm s390x: 798d452831a511b2145aeb4ab21b66d3 file-4.17-9.el5.s390x.rpm dfe62528bfa601ee08bece711f0263b5 file-debuginfo-4.17-9.el5.s390x.rpm x86_64: 7d76d229b35d23af0ab593322c49c1b6 file-4.17-9.el5.x86_64.rpm 99ca293ef9794b8708f7380e6627a8fb file-debuginfo-4.17-9.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFGA6dZXlSAg2UNWIIRAvf2AKCte4fpG34FbUaiOSh8yTuQcCEo/QCcDVBN TEYQ2antuxSENPvCajvfImE= =8hwE - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRgcZByh9+71yA2DNAQIY4QQAgsQLA3iOPdw+fLflpqHP9dfyEMDPQ3zV KrtfEjmEzy9s+GUolQ5c6VuxgU6l2NuXdsZCn8P4sUJC+N177tXAmEsK1f9w19DH mYoJk3vcP+tjLEOwTJxkEnf01MW0/j78q1lq8FwkPUhMXRvjeMntJUzlQghRW1xj dZxqI73Ql7Y= =bGNW -----END PGP SIGNATURE-----