Lucene search

K
mageiaGentoo FoundationMGASA-2014-0282
HistoryJul 04, 2014 - 10:26 p.m.

Updated file packages fix security vulnerabilities

2014-07-0422:26:27
Gentoo Foundation
advisories.mageia.org
22

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.157 Low

EPSS

Percentile

96.0%

A flaw was found in the way file parsed property information from Composite Document Files (CDF) files, where the mconvert() function did not correctly compute the truncated pascal string size (CVE-2014-3478). Multiple flaws were found in the way file parsed property information from Composite Document Files (CDF) files, due to insufficient boundary checks on buffers (CVE-2014-3479, CVE-2014-3480, CVE-2014-3487). Note: these issues were announced as part of the upstream PHP 5.4.30 release, as PHP bundles file’s libmagic library. Their announcement also references an issue in CDF file parsing, CVE-2014-0207, which was previously fixed in the file package in MGASA-2014-0252, but was not announced at that time.

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfile< 5.12-8.5file-5.12-8.5.mga3
Mageia4noarchfile< 5.16-1.4file-5.16-1.4.mga4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.157 Low

EPSS

Percentile

96.0%