First published: Wed Jul 09 2014(Updated: )
Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Christos Zoulas File 1 | <=5.18 | |
Christos Zoulas File 1 | =5.00 | |
Christos Zoulas File 1 | =5.01 | |
Christos Zoulas File 1 | =5.02 | |
Christos Zoulas File 1 | =5.03 | |
Christos Zoulas File 1 | =5.04 | |
Christos Zoulas File 1 | =5.05 | |
Christos Zoulas File 1 | =5.06 | |
Christos Zoulas File 1 | =5.07 | |
Christos Zoulas File 1 | =5.08 | |
Christos Zoulas File 1 | =5.09 | |
Christos Zoulas File 1 | =5.10 | |
Christos Zoulas File 1 | =5.11 | |
Christos Zoulas File 1 | =5.12 | |
Christos Zoulas File 1 | =5.13 | |
Christos Zoulas File 1 | =5.14 | |
Christos Zoulas File 1 | =5.15 | |
Christos Zoulas File 1 | =5.16 | |
Christos Zoulas File 1 | =5.17 | |
PHP | <=5.4.29 | |
PHP | =5.4.0 | |
PHP | =5.4.1 | |
PHP | =5.4.2 | |
PHP | =5.4.3 | |
PHP | =5.4.4 | |
PHP | =5.4.5 | |
PHP | =5.4.6 | |
PHP | =5.4.7 | |
PHP | =5.4.8 | |
PHP | =5.4.9 | |
PHP | =5.4.10 | |
PHP | =5.4.11 | |
PHP | =5.4.12 | |
PHP | =5.4.12-rc1 | |
PHP | =5.4.12-rc2 | |
PHP | =5.4.13 | |
PHP | =5.4.13-rc1 | |
PHP | =5.4.14 | |
PHP | =5.4.14-rc1 | |
PHP | =5.4.15-rc1 | |
PHP | =5.4.16-rc1 | |
PHP | =5.4.17 | |
PHP | =5.4.18 | |
PHP | =5.4.19 | |
PHP | =5.4.20 | |
PHP | =5.4.21 | |
PHP | =5.4.22 | |
PHP | =5.4.23 | |
PHP | =5.4.24 | |
PHP | =5.4.25 | |
PHP | =5.4.26 | |
PHP | =5.4.27 | |
PHP | =5.4.28 | |
PHP | =5.5.0 | |
PHP | =5.5.0-alpha1 | |
PHP | =5.5.0-alpha2 | |
PHP | =5.5.0-alpha3 | |
PHP | =5.5.0-alpha4 | |
PHP | =5.5.0-alpha5 | |
PHP | =5.5.0-alpha6 | |
PHP | =5.5.0-beta1 | |
PHP | =5.5.0-beta2 | |
PHP | =5.5.0-beta3 | |
PHP | =5.5.0-beta4 | |
PHP | =5.5.0-rc1 | |
PHP | =5.5.0-rc2 | |
PHP | =5.5.1 | |
PHP | =5.5.2 | |
PHP | =5.5.3 | |
PHP | =5.5.4 | |
PHP | =5.5.5 | |
PHP | =5.5.6 | |
PHP | =5.5.7 | |
PHP | =5.5.8 | |
PHP | =5.5.9 | |
PHP | =5.5.10 | |
PHP | =5.5.11 | |
PHP | =5.5.12 | |
PHP | =5.5.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3478 has a severity level that can lead to denial of service due to a buffer overflow issue.
To fix CVE-2014-3478, upgrade to Software version 5.19 or higher for the affected 'file' component.
CVE-2014-3478 affects versions of PHP before 5.4.30 and 5.5.x before 5.5.14, as well as 'file' versions before 5.19.
CVE-2014-3478 enables remote attackers to cause an application crash through crafted Pascal strings.
Yes, CVE-2014-3478 can be exploited remotely via specially crafted inputs to the vulnerable functions.