← Zuruck zu CVEs
CVE-2014-9652
N/ABeschreibung
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht3/30/2015
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
file_project:filephp:php
Schwachen (CWE)
CWE-119
Referenzen
http://bugs.gw.com/view.php?id=398(cve@mitre.org)
http://marc.info/?l=bugtraq&m=143748090628601&w=2(cve@mitre.org)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(cve@mitre.org)
http://openwall.com/lists/oss-security/2015/02/05/12(cve@mitre.org)
http://php.net/ChangeLog-5.php(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1053.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1066.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1135.html(cve@mitre.org)
http://www.securityfocus.com/bid/72505(cve@mitre.org)
https://bugs.php.net/bug.php?id=68735(cve@mitre.org)
https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079(cve@mitre.org)
https://security.gentoo.org/glsa/201701-42(cve@mitre.org)
https://support.apple.com/HT205267(cve@mitre.org)
http://bugs.gw.com/view.php?id=398(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=143748090628601&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2015/02/05/12(af854a3a-2127-422b-91ae-364da2661108)
http://php.net/ChangeLog-5.php(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1053.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1066.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1135.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/72505(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=68735(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-42(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT205267(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.