[File] [SECURITY] Integer Overflow in .mgc File nmagic Validation Leading to SIGSEGV (file-5.17)
Kerwin
kerwinxia66001 at gmail.com
Wed Apr 1 15:16:36 UTC 2026
Hi maintainers,
I am reporting an integer overflow vulnerability in libmagic (file-5.17)
where a crafted `.mgc` file exploits a `uint32_t` wraparound in the
`nmagic` sum validation in `apprentice_map()` (apprentice.c:2716-2733),
causing an out-of-bounds pointer and a SIGSEGV crash on the next access.
Please find the detailed vulnerability report and proof-of-concept files
attached.
Best regards
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.astron.com/pipermail/file/attachments/20260401/62eaa086/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: POC.tar
Type: application/x-tar
Size: 26624 bytes
Desc: not available
URL: <https://mailman.astron.com/pipermail/file/attachments/20260401/62eaa086/attachment-0001.tar>
More information about the File
mailing list