FreeBSD file module BEGIN Regular Expression Denial of Service Vulnerability
Release date:
Updated on:
Affected Systems:
FreeBSD
Description:
--------------------------------------------------------------------------------
CVE (CAN) ID: CVE-2013-7345
FreeBSD is a UNIX operating system and an important branch of Unix developed from BSD, javasbsd, and 4.4BSD. The file (1) utility can test the classification of file System Objects Based on the file system, magic number, and language. In the awk script detector of magic/Magdir/commands versions earlier than file 5.15, regular expressions of BEGIN repeatedly use multiple wildcards, which allows independent context attackers to use specially crafted ASCII files, A large amount of backtracking is triggered, resulting in denial of service.
A simple tutorial on Rsync synchronization on FreeBSD 8
FreeBSD8.2 system installation Salt
Create FreeBSD system custom installation ISO
FreeBSD builds NAT and configures multiple VLANs on a single Nic
<* Source: vendor
Link: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-14:16.file.asc
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
FreeBSD
-------
FreeBSD has released a Security Bulletin (FreeBSD-SA-14: 16. file) and patches for this:
FreeBSD-SA-14: 16. file: Multiple vulnerabilities in file (1) and libmagic (3)
Link: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-14:16.file.asc
This article permanently updates the link address: