Vulnerability Details : CVE-2014-3478
Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3478
Probability of exploitation activity in the next 30 days: 18.40%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3478
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
[email protected] |
CWE ids for CVE-2014-3478
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2014-3478
- http://marc.info/?l=bugtraq&m=141017844705317&w=2
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
- http://rhn.redhat.com/errata/RHSA-2014-1327.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://support.apple.com/kb/HT6443
-
http://www.securityfocus.com/bid/68239
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://www.debian.org/security/2014/dsa-3021
- http://mx.gw.com/pipermail/file/2014/001553.html
- https://support.apple.com/HT204659
-
https://bugs.php.net/bug.php?id=67410
Patch
- http://www.debian.org/security/2014/dsa-2974
- http://www.php.net/ChangeLog-5.php
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
-
https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08
Exploit;Patch
Products affected by CVE-2014-3478
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.17:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*
- cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*