Vulnerability Details : CVE-2014-3487
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2014-3487
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*
Threat overview for CVE-2014-3487
Top countries where our scanners detected CVE-2014-3487
Top open port discovered on systems with this issue
80
IPs affected by CVE-2014-3487 524,217
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-3487!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-3487
1.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3487
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2014-3487
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3487
-
http://www.securityfocus.com/bid/68120
PHP Fileinfo Component 'cdf_read_property_info()' Function Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=141017844705317&w=2
'[security bulletin] HPSBUX03102 SSRT101681 rev.1 - HP-UX Apache Server Suite running Apache Tomcat o' - MARCIssue Tracking;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
openSUSE-SU-2014:1236-1: moderate: several security fixes for php5Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-1766.html
RHSA-2014:1766 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://support.apple.com/kb/HT6443
About the security content of OS X Mavericks v10.9.5 and Security Update 2014-004 - Apple SupportThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
Oracle Bulletin Board Update - January 2015Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-1765.html
RHSA-2014:1765 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.debian.org/security/2014/dsa-3021
Debian -- Security Information -- DSA-3021-1 fileThird Party Advisory
-
http://mx.gw.com/pipermail/file/2014/001553.html
Broken Link
-
https://support.apple.com/HT204659
About the security content of OS X Yosemite v10.10.3 and Security Update 2015-004 - Apple SupportThird Party Advisory
-
http://www.debian.org/security/2014/dsa-2974
Debian -- Security Information -- DSA-2974-1 php5Third Party Advisory
-
https://bugs.php.net/bug.php?id=67413
PHP :: Sec Bug #67413 :: fileinfo: cdf_read_property_info insufficient boundary checkIssue Tracking;Patch;Vendor Advisory
-
http://www.php.net/ChangeLog-5.php
PHP: PHP 5 ChangeLogRelease Notes;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
Apple - Lists.apple.comBroken Link;Mailing List
-
https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
Add missing check offset test (Francisco Alonso, Jan Kaluza at RedHat) · file/file@93e063e · GitHubPatch;Third Party Advisory
Jump to