Synopsis
The remote Red Hat host is missing one or more security updates for file.
Description
The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2014:1606 advisory.
The file command is used to identify a particular file according to the type of data contained in the file. The command can identify various file types, including ELF binaries, system libraries, RPM packages, and different graphics formats.
Multiple denial of service flaws were found in the way file parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash file, or an application using file, via a specially crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2012-1571)
Two denial of service flaws were found in the way file handled indirect and search rules. A remote attacker could use either of these flaws to cause file, or an application using file, to crash or consume an excessive amount of CPU. (CVE-2014-1943, CVE-2014-2270)
This update also fixes the following bugs:
* Previously, the output of the file command contained redundant white spaces. With this update, the new STRING_TRIM flag has been introduced to remove the unnecessary white spaces. (BZ#664513)
* Due to a bug, the file command could incorrectly identify an XML document as a LaTex document. The underlying source code has been modified to fix this bug and the command now works as expected. (BZ#849621)
* Previously, the file command could not recognize .JPG files and incorrectly labeled them as Minix filesystem. This bug has been fixed and the command now properly detects .JPG files. (BZ#873997)
* Under certain circumstances, the file command incorrectly detected NETpbm files as x86 boot sector. This update applies a patch to fix this bug and the command now detects NETpbm files as expected. (BZ#884396)
* Previously, the file command incorrectly identified ASCII text files as a .PIC image file. With this update, a patch has been provided to address this bug and the command now correctly recognizes ASCII text files.
(BZ#980941)
* On 32-bit PowerPC systems, the from field was missing from the output of the file command. The underlying source code has been modified to fix this bug and file output now contains the from field as expected.
(BZ#1037279)
* The file command incorrectly detected text files as RRDTool DB version ool - Round Robin Database Tool. This update applies a patch to fix this bug and the command now correctly detects text files. (BZ#1064463)
* Previously, the file command supported only version 1 and 2 of the QCOW format. As a consequence, file was unable to detect a qcow2 compat=1.1 file created on Red Hat Enterprise Linux 7. With this update, support for QCOW version 3 has been added so that the command now detects such files as expected. (BZ#1067771)
All file users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL file package based on the guidance in RHSA-2014:1606.
Plugin Details
File Name: redhat-RHSA-2014-1606.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vendor
Vendor Severity: Moderate
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:redhat:enterprise_linux:python-magic, p-cpe:/a:redhat:enterprise_linux:file, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:file-libs, p-cpe:/a:redhat:enterprise_linux:file-static, p-cpe:/a:redhat:enterprise_linux:file-devel
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 10/13/2014
Vulnerability Publication Date: 7/17/2012
Reference Information
CVE: CVE-2012-1571, CVE-2014-0237, CVE-2014-0238, CVE-2014-1943, CVE-2014-2270, CVE-2014-3479, CVE-2014-3480
BID: 52225, 65596, 66002, 67759, 67765, 68238, 68241