First published: Tue Feb 03 2015(Updated: )
Possible buffer read overflow was fixed upstream [1]. This was also reported against PHP: <a href="https://bugs.php.net/bug.php?id=68601">https://bugs.php.net/bug.php?id=68601</a> (bug is private, fixed in PHP 5.6.5) [1]: <a href="https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43">https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.5.21 | 5.5.21 |
redhat/php | <5.6.5 | 5.6.5 |
redhat/gd | <2.1.1 | 2.1.1 |
PHP | >=5.4.0<5.4.40 | |
PHP | >=5.5.0<5.5.21 | |
PHP | >=5.6.0<5.6.5 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
libgd | <=2.1.1 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9709 has been classified as a medium severity vulnerability due to its potential for exploitation through a buffer read overflow.
To fix CVE-2014-9709, upgrade PHP to version 5.6.5 or later, or GD to version 2.1.1 or later.
CVE-2014-9709 affects PHP versions prior to 5.5.21 and 5.6.5, as well as GD versions prior to 2.1.1.
Yes, CVE-2014-9709 is fixed in various distributions including Red Hat, Ubuntu, and Debian with updated versions of PHP and GD.
CVE-2014-9709 is a buffer read overflow vulnerability that can lead to information disclosure.