First published: Tue Oct 21 2014(Updated: )
An out-of-bounds read flaw was found in file's donote() function in the way the file utility determined the note headers of a elf file. This could possibly lead to file executable crash. Upstream fix: <a href="https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0">https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.4.35 | 5.4.35 |
redhat/php | <5.5.19 | 5.5.19 |
redhat/php | <5.6.3 | 5.6.3 |
redhat/file | <5.22 | 5.22 |
PHP | >=5.4.0<5.4.35 | |
PHP | >=5.5.0<5.5.19 | |
PHP | >=5.6.0<5.6.3 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3710 has been classified as a medium severity vulnerability due to its potential to cause application crashes.
To fix CVE-2014-3710, upgrade the affected software to versions 5.4.36, 5.5.20, or 5.6.4 or later for PHP and 5.22 or later for the file utility.
CVE-2014-3710 affects various versions of PHP up to 5.4.35, 5.5.19, 5.6.3, and the file utility up to version 5.22.
The risk associated with CVE-2014-3710 is mainly the potential for software crashes, which could lead to denial of service.
CVE-2014-3710 does not have a direct mechanism for remote exploitation but can be triggered through crafted ELF files if the software processes them.