CVE-2007-2799

Source
https://cve.org/CVERecord?id=CVE-2007-2799
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-2799.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-2799
Downstream
Related
Withdrawn
2026-01-27T04:08:58.254744Z
Published
2007-05-23T21:30:00Z
Modified
2026-01-27T04:08:58.254744Z
Summary
[none]
Details

Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. NOTE: this issue is due to an incorrect patch for CVE-2007-1536.

References

Affected packages