__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
								  File Security Update
							   [Red Hat RHSA-2007:0391-3]
	
	May 30, 2007 18:00 GMT                                            Number R-250
	______________________________________________________________________________
	PROBLEM:       There is an integer underflow flaw in the file utility. 
	PLATFORM:      Red Hat Desktop (v. 4) 
				   Red Hat Enterprise Linux (v. 5 server) 
				   Red Hat Enterprise Linux AS, ES, WS (v. 4) 
				   Red Hat Enterprise Linux Desktop (v. 5 client) 
	DAMAGE:        An attacker could create a carefully crafted file which, if 
				   examined by a victim using the file utility, could lead to 
				   arbitrary code execution. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is MEDIUM. An attacker could create a carefully 
	ASSESSMENT:    crafted file which, if examined by a victim using the file 
				   utility, could lead to arbitrary code execution. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-250.shtml 
	 ORIGINAL BULLETIN:  https://rhn.redhat.com/errata/RHSA-2007-0391.html 
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2007-2799 
	______________________________________________________________________________
	[***** Start Red Hat RHSA-2007:0391-3 *****]
	
	Moderate: file security update
	Advisory: RHSA-2007:0391-3 
	Type: Security Advisory 
	Severity: Moderate 
	Issued on: 2007-05-30 
	Last updated on: 2007-05-30 
	Affected Products: Red Hat Desktop (v. 4)
	Red Hat Enterprise Linux (v. 5 server)
	Red Hat Enterprise Linux AS (v. 4)
	Red Hat Enterprise Linux Desktop (v. 5 client)
	Red Hat Enterprise Linux ES (v. 4)
	Red Hat Enterprise Linux WS (v. 4) 
	OVAL: com.redhat.rhsa-20070391.xml 
	CVEs (cve.mitre.org): CVE-2007-2799
	 
	
	
	Details
	An updated file package that fixes a security flaw is now available for Red 
	Hat Enterprise Linux 4 and 5. 
	
	This update has been rated as having moderate security impact by the Red 
	Hat Security Response Team.
	
	The file command is used to identify a particular file according to the 
	type of data contained by the file. 
	
	The fix for CVE-2007-1536 introduced a new integer underflow flaw in the 
	file utility. An attacker could create a carefully crafted file which, if 
	examined by a victim using the file utility, could lead to arbitrary code 
	execution. (CVE-2007-2799) 
	
	This issue did not affect the version of the file utility distributed with 
	Red Hat Enterprise Linux 2.1 or 3. 
	
	Users should upgrade to this erratum package, which contain a backported 
	patch to correct this issue.
	
	
	
	Solution
	Before applying this update, make sure that all previously-released 
	errata relevant to your system have been applied. 
	
	This update is available via Red Hat Network. Details on how to use 
	the Red Hat Network to apply this update are available at 
	http://kbase.redhat.com/faq/FAQ_58_10188
	
	
	Updated packages
	Red Hat Desktop (v. 4) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.10-3.0.2.el4.src.rpm     b965edbfc8969978c85c0523d8d66e86 
	  
	IA-32: 
	file-4.10-3.0.2.el4.i386.rpm     75f00f87378cd18b54aedb769f794301 
	  
	x86_64: 
	file-4.10-3.0.2.el4.x86_64.rpm     d015b5bc4eb50598633b251145cfc5ad 
	  
	Red Hat Enterprise Linux (v. 5 server) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.17-9.0.1.el5.src.rpm     e5f3056e10d0abf9ab2d4734d2c40df6 
	  
	IA-32: 
	file-4.17-9.0.1.el5.i386.rpm     1bca600f3b0de26a2725d6f4e7a72383 
	  
	IA-64: 
	file-4.17-9.0.1.el5.ia64.rpm     2d7e954147b37218beafcebf771865b3 
	  
	PPC: 
	file-4.17-9.0.1.el5.ppc.rpm     8051227058fb32153ce838aea9f36268 
	  
	s390x: 
	file-4.17-9.0.1.el5.s390x.rpm     d9ccaf596792a8487e1ef137cb6db3f3 
	  
	x86_64: 
	file-4.17-9.0.1.el5.x86_64.rpm     1750ba7e71efd10cd3883b2de825f896 
	  
	Red Hat Enterprise Linux AS (v. 4) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.10-3.0.2.el4.src.rpm     b965edbfc8969978c85c0523d8d66e86 
	  
	IA-32: 
	file-4.10-3.0.2.el4.i386.rpm     75f00f87378cd18b54aedb769f794301 
	  
	IA-64: 
	file-4.10-3.0.2.el4.ia64.rpm     8783b9863d2ed05c508d92b23503f920 
	  
	PPC: 
	file-4.10-3.0.2.el4.ppc.rpm     dd47db6fa389f2ff5928250893a7be8b 
	  
	s390: 
	file-4.10-3.0.2.el4.s390.rpm     b546e7c44fb7eda2e7be1d1d72433799 
	  
	s390x: 
	file-4.10-3.0.2.el4.s390x.rpm     e7f435b24698bc2317dd9b5899cb1b90 
	  
	x86_64: 
	file-4.10-3.0.2.el4.x86_64.rpm     d015b5bc4eb50598633b251145cfc5ad 
	  
	Red Hat Enterprise Linux Desktop (v. 5 client) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.17-9.0.1.el5.src.rpm     e5f3056e10d0abf9ab2d4734d2c40df6 
	  
	IA-32: 
	file-4.17-9.0.1.el5.i386.rpm     1bca600f3b0de26a2725d6f4e7a72383 
	  
	x86_64: 
	file-4.17-9.0.1.el5.x86_64.rpm     1750ba7e71efd10cd3883b2de825f896 
	  
	Red Hat Enterprise Linux ES (v. 4) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.10-3.0.2.el4.src.rpm     b965edbfc8969978c85c0523d8d66e86 
	  
	IA-32: 
	file-4.10-3.0.2.el4.i386.rpm     75f00f87378cd18b54aedb769f794301 
	  
	IA-64: 
	file-4.10-3.0.2.el4.ia64.rpm     8783b9863d2ed05c508d92b23503f920 
	  
	x86_64: 
	file-4.10-3.0.2.el4.x86_64.rpm     d015b5bc4eb50598633b251145cfc5ad 
	  
	Red Hat Enterprise Linux WS (v. 4) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	file-4.10-3.0.2.el4.src.rpm     b965edbfc8969978c85c0523d8d66e86 
	  
	IA-32: 
	file-4.10-3.0.2.el4.i386.rpm     75f00f87378cd18b54aedb769f794301 
	  
	IA-64: 
	file-4.10-3.0.2.el4.ia64.rpm     8783b9863d2ed05c508d92b23503f920 
	  
	x86_64: 
	file-4.10-3.0.2.el4.x86_64.rpm     d015b5bc4eb50598633b251145cfc5ad 
	  
	(The unlinked packages above are only available from the Red Hat Network)
	 
	
	
	Bugs fixed (see bugzilla for more information)
	241022 - CVE-2007-2799 file integer overflow
	241026 - CVE-2007-2799 file integer overflow
	241027 - CVE-2007-2799 file integer overflow
	
	
	
	References
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799
	http://www.redhat.com/security/updates/classification/#moderate 
	
	
	--------------------------------------------------------------------------------
	These packages are GPG signed by Red Hat for security. Our key and details on how 
	to verify the signature are available from:
	
	https://www.redhat.com/security/team/key/#package 
	
	The Red Hat security contact is secalert@redhat.com. More contact details at 
	http://www.redhat.com/security/team/contact/
	
	
	[***** End Red Hat RHSA-2007:0391-3 *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Red Hat for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-241: CA Anti-Virus for the Enterprise Securitiy Notice
	R-242: Security Vulnerability in Sun Remote Services (SRS) Net Connect Software
	R-243: Tomcat Security Update
	R-244: OPeNDAP Vulnerability
	CIACTech07-001: MOICE - Microsoft Office Isolated Conversion Environment
	R-245: Vulnerability in Crypto Library
	R-246: Multiple Vulnerabilities in Cisco IOS while Processing SSL Packets
	R-247: Apple Security Update 2007-005
	R-248: Security Vulnerabilities in the SOCKS Module of Sun Java System Web Proxy
	R-249: Avast! Antivirus Vulnerability