{"vuid":"VU#611865","idnumber":"611865","name":"Automatic File Content Type Recognition Tool vulnerable to stack overflow","keywords":["Automatic File Content Type Recognition Tool","stack overflow"],"overview":"A buffer overflow vulnerability exists in the \"Automatic File Content Type Recognition Tool\" versions of the file[1] package prior to 3.41.","clean_desc":"The file[1] package is used to examine files on the system. According to an OpenPKG advisory, a stack overflow vulnerability exists in the \"Automatic File Content Type Recognition Tool\" (AFCTR tool) versions of the file[1] package prior to 3.41. It appears that an exploit for this vulnerability has been posted to the bugtraq mailing list.","impact":"If an attacker can craft a malicious file on the system and trick a victim to examine the file using the AFCTR tool, they can execute arbitrary code with the privileges of the victim.","resolution":"Upgrade to the version 3.41 of the file[1] package, or apply a patch specified by your vendor.","workarounds":"","sysaffected":"","thanks":"David Endler is credited for reporting this vulnerability. Information regarding this vulnerability was disclosed in an OpenPKG advisory and an I-Defense advisory.","author":"This document was written by Jason A Rafail.","public":["f","t","p",":","/","/","f","t","p",".","a","s","t","r","o","n",".","c","o","m","/","p","u","b","/","f","i","l","e"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-04T17:53:37Z","publicdate":"2003-03-04T00:00:00Z","datefirstpublished":"2003-03-06T21:29:49Z","dateupdated":"2003-03-07T20:16:25Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"2","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.140625","cam_scorecurrentwidelyknown":"0.140625","cam_scorecurrentwidelyknownexploited":"0.253125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.140625,"vulnote":null}