CVE-2007-2799

NameCVE-2007-2799
DescriptionInteger overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1343-1, DSA-1343-2
Debian Bugs428293

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
sid, trixie1:5.45-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesarge4.12-1sarge2DSA-1343-1
filesourceetch4.17-5etch3DSA-1343-2
filesource(unstable)4.21-1medium428293

Search for package or bug name: Reporting problems