CVE-2014-3538

file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
christos_zoulasfile
𝑥
≤ 5.18
christos_zoulasfile
5.00
christos_zoulasfile
5.01
christos_zoulasfile
5.02
christos_zoulasfile
5.03
christos_zoulasfile
5.04
christos_zoulasfile
5.05
christos_zoulasfile
5.06
christos_zoulasfile
5.07
christos_zoulasfile
5.08
christos_zoulasfile
5.09
christos_zoulasfile
5.10
christos_zoulasfile
5.11
christos_zoulasfile
5.12
christos_zoulasfile
5.13
christos_zoulasfile
5.14
christos_zoulasfile
5.15
christos_zoulasfile
5.16
christos_zoulasfile
5.17
phpphp
5.4.0 ≤
𝑥
< 5.4.32
phpphp
5.5.0 ≤
𝑥
< 5.5.16
debiandebian_linux
7.0
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
file
bullseye
1:5.39-3+deb11u1
fixed
bullseye (security)
1:5.39-3+deb11u1
fixed
bookworm
1:5.44-3
fixed
sid
1:5.45-3
fixed
trixie
1:5.45-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
file
trusty
Fixed 1:5.14-2ubuntu3.1
released
saucy
Fixed 5.11-2ubuntu4.3
released
precise
Fixed 5.09-2ubuntu0.4
released
lucid
ignored
Common Weakness Enumeration
References