-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2007.0194 -- [UNIX/Linux][RedHat]
                      Moderate: file security update
                               26 March 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              file
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux 5
                      Red Hat Enterprise Linux 4
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-1536

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0124.html
                      http://mx.gw.com/pipermail/file/2007/000161.html

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Red Hat. It is recommended that administrators
         running the file utility check for an updated version of the
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: file security update
Advisory ID:       RHSA-2007:0124-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0124.html
Issue date:        2007-03-23
Updated on:        2007-03-23
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1536 
- - ---------------------------------------------------------------------

1. Summary:

An updated file package that fixes a security flaw is now available for Red
Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The file command is used to identify a particular file according to the
type of data contained by the file.

An integer underflow flaw was found in the file utility.  An attacker could
create a carefully crafted file which, if examined by a victim using the
file utility, could lead to arbitrary code execution. (CVE-2007-1536)

This issue did not affect the version of the file utility distributed with
Red Hat Enterprise Linux 2.1 or 3.

Users should upgrade to this erratum package, which contain a backported
patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

233161 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution
233337 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

ppc:
4ff799e23850ad56b777c3213b5897b3  file-4.10-3.EL4.5.ppc.rpm
5e8256aa72a078d8a236ade85838000e  file-debuginfo-4.10-3.EL4.5.ppc.rpm

s390:
947e89850ecd9f3e218a86b31060bbff  file-4.10-3.EL4.5.s390.rpm
c9b44db20a5f0f3ef326e13ab8e91416  file-debuginfo-4.10-3.EL4.5.s390.rpm

s390x:
238b84277df82e589e2da1c080390391  file-4.10-3.EL4.5.s390x.rpm
afbd86c4b660e26cf5a855834978453e  file-debuginfo-4.10-3.EL4.5.s390x.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5  file-4.10-3.EL4.5.src.rpm

i386:
2148dbe144b2c050a5aa94559f3a1fe1  file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992  file-debuginfo-4.10-3.EL4.5.i386.rpm

ia64:
4213f7d5e2c136a3bebc008f43f9b9cb  file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243  file-debuginfo-4.10-3.EL4.5.ia64.rpm

x86_64:
ca289eace58ff0886e6fc40f55b7d03e  file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06  file-debuginfo-4.10-3.EL4.5.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a  file-4.17-9.el5.src.rpm

i386:
d044793730b6eb50f99f89e250ff1f68  file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55  file-debuginfo-4.17-9.el5.i386.rpm

x86_64:
7d76d229b35d23af0ab593322c49c1b6  file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb  file-debuginfo-4.17-9.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a  file-4.17-9.el5.src.rpm

i386:
d044793730b6eb50f99f89e250ff1f68  file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55  file-debuginfo-4.17-9.el5.i386.rpm

ia64:
ec120e826901810a56d962483b02612a  file-4.17-9.el5.ia64.rpm
a7ec74f8c96a2e219eac81c96d0d3325  file-debuginfo-4.17-9.el5.ia64.rpm

ppc:
9fe5754f3933494b9c973e30d570ff77  file-4.17-9.el5.ppc.rpm
29883718c7ce2a2b404647f0104c9f29  file-debuginfo-4.17-9.el5.ppc.rpm

s390x:
798d452831a511b2145aeb4ab21b66d3  file-4.17-9.el5.s390x.rpm
dfe62528bfa601ee08bece711f0263b5  file-debuginfo-4.17-9.el5.s390x.rpm

x86_64:
7d76d229b35d23af0ab593322c49c1b6  file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb  file-debuginfo-4.17-9.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGA6dZXlSAg2UNWIIRAvf2AKCte4fpG34FbUaiOSh8yTuQcCEo/QCcDVBN
TEYQ2antuxSENPvCajvfImE=
=8hwE
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRgcZByh9+71yA2DNAQIY4QQAgsQLA3iOPdw+fLflpqHP9dfyEMDPQ3zV
KrtfEjmEzy9s+GUolQ5c6VuxgU6l2NuXdsZCn8P4sUJC+N177tXAmEsK1f9w19DH
mYoJk3vcP+tjLEOwTJxkEnf01MW0/j78q1lq8FwkPUhMXRvjeMntJUzlQghRW1xj
dZxqI73Ql7Y=
=bGNW
-----END PGP SIGNATURE-----