First published: Mon Apr 28 2014(Updated: )
Invalid pointer dereference flaws were found in the way file, utility for determining of file types processed header section for certain Composite Document Format (CDF) files. A remote attacker could provide a specially-crafted CDF file, which once inspected by the file utility of the victim would lead to file executable crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Christos Zoulas File 1 | <5.19 | |
PHP | <5.3.29 | |
PHP | >=5.4.0<5.4.30 | |
PHP | >=5.5.0<5.5.14 | |
Oracle Linux | =7 | |
openSUSE | =11.4 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0207 has been classified with a moderate severity rating due to the potential for exploitation via specially-crafted CDF files.
To fix CVE-2014-0207, update the 'file' utility to the latest version beyond 5.19 or ensure PHP is upgraded to versions above 5.3.29.
CVE-2014-0207 affects several systems including older versions of the 'file' utility and PHP on distributions like Debian GNU/Linux, Oracle Linux, and openSUSE.
Yes, CVE-2014-0207 can be exploited remotely if a user inspects a maliciously crafted CDF file using the vulnerable utility.
CVE-2014-0207 could facilitate denial-of-service attacks or potentially allow an attacker to execute arbitrary code on the victim's system.