Amazon Linux AMI update for file



Published: 2014-07-23
Risk Medium
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2013-7345
CVE-2014-0207
CVE-2014-0237
CVE-2014-0238
CVE-2014-3478
CVE-2014-3479
CVE-2014-3480
CVE-2014-3487
CVE-2014-3538
CWE-ID CWE-264
CWE-617
CWE-835
CWE-119
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU32548

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2013-7345

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Reachable assertion

EUVDB-ID: #VU16087

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-0207

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to assertion failure in the cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14. A remote attacker can trigger reachable assertion via a specially crafted CDF file and cause the service to crash.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Denial of service

EUVDB-ID: #VU16084

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-0237

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 due to performance degradation. A remote attacker can trigger many file_printf calls and cause the service to crash.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Infinite loop

EUVDB-ID: #VU16085

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-0238

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in the cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13. A remote attacker can trigger out-of-bounds memory access via a vector that (1) has zero length or (2) is too long and cause the service to crash.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU16088

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-3478

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14. A remote attacker can trigger memory corruption via a crafted Pascal string in a FILE_PSTRING conversion and cause the service to crash.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU16089

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-3479

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when the cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data. A remote attacker can cause the service to crash via a crafted stream offset in a CDF file.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU16090

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-3480

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of sector-count data by df_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14. A remote attacker can cause application crash via a crafted CDF file.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU16091

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-3487

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of a stream offset by the cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14. A remote attacker can cause the application to crash via a crafted CDF file.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU32500

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2014-3538

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule.

Mitigation

Update the affected packages:

i686:
    file-devel-5.19-1.18.amzn1.i686
    file-5.19-1.18.amzn1.i686
    file-static-5.19-1.18.amzn1.i686
    file-debuginfo-5.19-1.18.amzn1.i686
    file-libs-5.19-1.18.amzn1.i686

noarch:
    python-magic-5.19-1.18.amzn1.noarch

src:
    file-5.19-1.18.amzn1.src

x86_64:
    file-5.19-1.18.amzn1.x86_64
    file-devel-5.19-1.18.amzn1.x86_64
    file-libs-5.19-1.18.amzn1.x86_64
    file-debuginfo-5.19-1.18.amzn1.x86_64
    file-static-5.19-1.18.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2014-382.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###