CVE-2014-1943

NameCVE-2014-1943
DescriptionFine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2861-1, DSA-2868-1
NVD severitymedium
Debian Bugs738832, 739012

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)stretch (security), stretch1:5.30-1+deb9u3fixed
buster, buster (security)1:5.35-4+deb10u1fixed
bullseye1:5.38-5fixed
sid1:5.39-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesqueeze5.04-5+squeeze3DSA-2861-1
filesourcewheezy5.11-2+deb7u1DSA-2861-1
filesource(unstable)1:5.17-0.1738832
php5sourcesqueeze5.3.3-7+squeeze19DSA-2868-1
php5sourcewheezy5.4.4-14+deb7u8DSA-2868-1
php5source(unstable)5.5.10+dfsg-1739012

Notes

http://mx.gw.com/pipermail/file/2014/001337.html
https://github.com/glensc/file/commit/3c081560c23f20b2985c285338b52c7aae9fdb0f
https://github.com/glensc/file/commit/cc9e74dfeca5265ad725acc926ef0b8d2a18ee70

Search for package or bug name: Reporting problems