Vulnerability Name:

CVE-2004-1304 (CCN-18368)

Assigned:2004-11-29
Published:2004-11-29
Updated:2017-07-11
Summary:Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-1304

Source: CCN
Type: Freshmeat.net Web site
file

Source: CCN
Type: SECTRACK ID: 1012433
`File` Stack Overflow in Processing ELF Headers May Permit Arbitrary Code Execution

Source: SECTRACK
Type: UNKNOWN
1012433

Source: CCN
Type: GLSA-200412-07
file: Arbitrary code execution

Source: GENTOO
Type: UNKNOWN
GLSA-200412-07

Source: CCN
Type: Trustix Secure Linux Advisory #2004-0063
Multiple bugfixes

Source: CCN
Type: OSVDB ID: 12255
file ELF Header Parsing Unspecified Stack Manipulation

Source: BID
Type: Patch, Vendor Advisory
11771

Source: CCN
Type: BID-11771
File ELF Header Unspecified Buffer Overflow Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2004-0063

Source: XF
Type: UNKNOWN
file-elf-header-bo(18368)

Source: XF
Type: UNKNOWN
file-elf-header-bo(18368)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:file:file:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.3:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.4:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.6:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.7:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.8:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.9:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.10:*:*:*:*:*:*:*
  • OR cpe:/a:file:file:4.11:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20041304
    V
    CVE-2004-1304
    2015-11-16
    BACK
    file file 4.0
    file file 4.1
    file file 4.2
    file file 4.3
    file file 4.4
    file file 4.5
    file file 4.6
    file file 4.7
    file file 4.8
    file file 4.9
    file file 4.10
    file file 4.11
    gentoo linux *
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2