5
CVSSv2

CVE-2014-9652

Published: 30/03/2015 Updated: 01/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The mconvert function in softmagic.c in file prior to 5.21, as used in the Fileinfo component in PHP prior to 5.4.37, 5.5.x prior to 5.5.21, and 5.6.x prior to 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote malicious users to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.5.0

php php 5.5.16

php php 5.5.17

php php 5.5.5

php php 5.5.6

php php 5.6.0

php php 5.6.4

php php

php php 5.5.12

php php 5.5.13

php php 5.5.2

php php 5.5.20

php php 5.5.9

php php 5.6.1

php php 5.5.1

php php 5.5.10

php php 5.5.11

php php 5.5.18

php php 5.5.19

php php 5.5.7

php php 5.5.8

php php 5.5.14

php php 5.5.15

php php 5.5.3

php php 5.5.4

php php 5.6.2

php php 5.6.3

file project file

Vendor Advisories

Synopsis Moderate: file security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated file packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having Moderate securityimpact Commo ...
Several security issues were fixed in PHP ...
An ouf-of-bounds read flaw was found in the way the file utility processed certain Pascal strings A remote attacker could cause an application using the file utility (for example, PHP using the fileinfo module) to crash if it was used to identify the type of the attacker-supplied file ...