← Back to CVEs
CVE-2014-9652
N/ADescription
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
CVE Details
CVSS v3.1 ScoreN/A
Published3/30/2015
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
file_project:filephp:php
Weaknesses (CWE)
CWE-119
References
http://bugs.gw.com/view.php?id=398(cve@mitre.org)
http://marc.info/?l=bugtraq&m=143748090628601&w=2(cve@mitre.org)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(cve@mitre.org)
http://openwall.com/lists/oss-security/2015/02/05/12(cve@mitre.org)
http://php.net/ChangeLog-5.php(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1053.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1066.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-1135.html(cve@mitre.org)
http://www.securityfocus.com/bid/72505(cve@mitre.org)
https://bugs.php.net/bug.php?id=68735(cve@mitre.org)
https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079(cve@mitre.org)
https://security.gentoo.org/glsa/201701-42(cve@mitre.org)
https://support.apple.com/HT205267(cve@mitre.org)
http://bugs.gw.com/view.php?id=398(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=143748090628601&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2015/02/05/12(af854a3a-2127-422b-91ae-364da2661108)
http://php.net/ChangeLog-5.php(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1053.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1066.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1135.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/72505(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/bug.php?id=68735(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-42(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT205267(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.