Rapid7 Vulnerability & Exploit Database

RHSA-2003:086: Updated file packages fix vulnerability

Back to Search

RHSA-2003:086: Updated file packages fix vulnerability



Updated file packages are available to close a buffer overflow vulnerability. [Updated 16 April 2003] Added packages for Red Hat Linux on IBM iSeries and pSeries systems.

The file command is used to identify a particular file according to the type of data contained in the file. The file utility before version 3.41 contains a buffer overflow vulnerability in the ELF parsing routines. This vulnerability may allow an attacker to create a carefully crafted binary which can allow arbitrary code to be run if a victim runs the 'file' command on that binary. There are other ways that an attacker may be able to take advantage of this vulnerability in the file command: -- In Red Hat Linux 6.2 and 7.0, the rhs-printfilter package makes use of the file command. This would allow an attacker who has the ability to print to execute arbitrary commands (as the user 'lp') on the print server by sending a malicious file. -- On some Red Hat Linux distributions it may also be possible to trigger this exploit by encouraging the victim to use the 'less' command on a malicious file which is named so that it will be processed by the 'lesspipe.sh' script. All users are advised to update to these erratum packages, which contain a backported patch to correct this vulnerability. Red Hat would like to thank iDefense for disclosing this issue and zen-parse for discussion of some of the implications.


  • redhat-upgrade-file

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center