MGASA-2014-0142

Source
https://advisories.mageia.org/MGASA-2014-0142.html
Import Source
https://advisories.mageia.org/MGASA-2014-0142.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0142
Related
Published
2014-03-31T19:34:34Z
Modified
2014-03-31T19:34:18Z
Summary
Updated file packages fix security vulnerabilities
Details

The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters (CVE-2013-7345).

References
Credits

Affected packages

Mageia:3 / file

Package

Name
file
Purl
pkg:rpm/mageia/file?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.12-8.3.mga3

Ecosystem specific

{
    "section": "core"
}