Vulnerability Details : CVE-2013-7345
The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
Vulnerability category: Denial of service
Threat overview for CVE-2013-7345
Top countries where our scanners detected CVE-2013-7345
Top open port discovered on systems with this issue
80
IPs affected by CVE-2013-7345 158,100
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-7345!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-7345
Probability of exploitation activity in the next 30 days: 0.44%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-7345
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2013-7345
-
http://bugs.gw.com/view.php?id=164
Broken Link;Exploit;Issue Tracking;Patch;Third Party Advisory
-
http://support.apple.com/kb/HT6443
About the security content of OS X Mavericks v10.9.5 and Security Update 2014-004 - Apple SupportThird Party Advisory
-
http://www.debian.org/security/2014/dsa-2873
Debian -- Security Information -- DSA-2873-1 fileThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-1765.html
RHSA-2014:1765 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://github.com/file/file/commit/ef2329cf71acb59204dd981e2c6cce6c81fe467c
limit to 100 repetitions to avoid excessive backtracking Carsten Wolff · file/file@ef2329c · GitHubExploit;Patch;Third Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993
#703993 - file: possible DoS in awk magic - Debian Bug report logsIssue Tracking;Third Party Advisory
Products affected by CVE-2013-7345
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*