Mandrake Security Advisory MDVSA-2009:129 (file)

The remote host is missing an update to file announced via advisory MDVSA-2009:129.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
A security vulnerability has been identified and fixed in file: Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information (CVE-2009-1515). This update provides file-5.03, which is not vulnerable to this, and other unspecified issues. Affected: 2009.1