Vulnerability Details : CVE-2014-9621
The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-9621
Probability of exploitation activity in the next 30 days: 3.65%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-9621
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-9621
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9621
-
https://usn.ubuntu.com/3686-1/
USN-3686-1: file vulnerabilities | Ubuntu security notices
-
https://security.gentoo.org/glsa/201503-08
file: Denial of Service (GLSA 201503-08) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2015/01/17/9
oss-security - Re: CVE request: file(1) DoS
-
http://mx.gw.com/pipermail/file/2015/001660.html
Vendor Advisory
-
http://mx.gw.com/pipermail/file/2014/001654.html
-
http://advisories.mageia.org/MGASA-2015-0040.html
Mageia Advisory: MGASA-2015-0040 - Updated php packages fix security vulnerabilities
-
https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c
Limit string printing to 100 chars, and add flags I forgot in the pre… · file/file@65437ce · GitHub
Products affected by CVE-2014-9621
- cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:5.16:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:5.17:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:5.21:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:5.18:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:5.19:*:*:*:*:*:*:*