CVE-2013-7345

N/A Unknown
Published: March 24, 2014 Modified: May 06, 2026
View on NVD

Description

The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.gw.com/view.php?id=164
Source: cve@mitre.org
Broken Link Exploit Issue Tracking Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html
Source: cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT6443
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2014/dsa-2873
Source: cve@mitre.org
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://github.com/file/file/commit/ef2329cf71acb59204dd981e2c6cce6c81fe467c
Source: cve@mitre.org
Exploit Patch Third Party Advisory
http://bugs.gw.com/view.php?id=164
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Issue Tracking Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT6443
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2014/dsa-2873
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://github.com/file/file/commit/ef2329cf71acb59204dd981e2c6cce6c81fe467c
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.1%
78th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

debian php christos_zoulas