First published: Fri Mar 14 2014(Updated: )
It was reported [1] that the gdImageCreateFromXpm() function in libgd could dereference a NULL pointer, noting: "The call to strlen() parses image.colorTable[i].c_color which is initialised as NULL if the particular color mapping uses a different key (such as monochrome/monovisual)." This was reported against PHP, which includes an embedded copy of the gd library. <a href="https://access.redhat.com/security/cve/CVE-2014-2497">CVE-2014-2497</a> was assigned to this issue [2]. [1] <a href="https://bugs.php.net/bug.php?id=66901">https://bugs.php.net/bug.php?id=66901</a> [2] <a href="http://seclists.org/oss-sec/2014/q1/580">http://seclists.org/oss-sec/2014/q1/580</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.5.16 | 5.5.16 |
redhat/php | <5.4.32 | 5.4.32 |
PHP | <5.4.32 | |
PHP | >=5.5.0<5.5.16 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =6.5 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
<5.4.32 | ||
>=5.5.0<5.5.16 | ||
=12.04 | ||
=14.04 | ||
=15.10 | ||
=16.04 | ||
=11-sp2 | ||
=11-sp3 | ||
=11-sp3 | ||
=11-sp3 | ||
=6.0 | ||
=7.0 | ||
=6.5 | ||
=7.3 | ||
=7.4 | ||
=7.5 | ||
=7.6 | ||
=7.7 | ||
=6.0 | ||
=7.0 | ||
=6.5 | ||
=7.3 | ||
=7.6 | ||
=6.5 | ||
=7.3 | ||
=7.6 | ||
=7.7 | ||
=6.0 | ||
=7.0 | ||
=7.0 | ||
=8.0 | ||
=11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2497 has been classified as a medium severity vulnerability due to the potential for denial of service.
To fix CVE-2014-2497, upgrade to PHP version 5.4.32 or 5.5.16 or later.
CVE-2014-2497 affects PHP versions prior to 5.4.32 and between 5.5.0 and 5.5.16.
The vulnerability in CVE-2014-2497 is related to the gdImageCreateFromXpm() function in libgd.
CVE-2014-2497 can be found in various Linux distributions including Red Hat, Ubuntu, and SUSE.