Mandriva Linux Security Advisory : file (MDVSA-2014:167)

Medium Nessus Plugin ID 77646


The remote Mandriva Linux host is missing one or more security updates.


Updated file packages fix security vulnerability :

A flaw was found in the way file uses cdf_read_property_info function when checks stream offsets for certain Composite Document Format (CDF). An insufficient input validation flaw for p and q minimal and maximal value, leads to a pointer overflow. This issue only affects 32bit systems (CVE-2014-3587).


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 77646

File Name: mandriva_MDVSA-2014-167.nasl

Version: $Revision: 1.1 $

Type: local

Published: 2014/09/12

Modified: 2014/09/12

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:file, p-cpe:/a:mandriva:linux:lib64magic-devel, p-cpe:/a:mandriva:linux:lib64magic-static-devel, p-cpe:/a:mandriva:linux:lib64magic1, p-cpe:/a:mandriva:linux:python-magic, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/09/02

Reference Information

CVE: CVE-2014-3587

BID: 69325

MDVSA: 2014:167