CVE-2014-2020CVE-2014-2020

Affected configuration(s):

cpe:/a:php:php:5.5.0:alpha1
cpe:/a:php:php:5.5.0:alpha2
cpe:/a:php:php:5.5.0:alpha3
cpe:/a:php:php:5.5.0:alpha4
cpe:/a:php:php:5.5.0:alpha5
cpe:/a:php:php:5.5.0:alpha6
cpe:/a:php:php:5.5.0:beta1
cpe:/a:php:php:5.5.0:beta2
cpe:/a:php:php:5.5.0:beta3
cpe:/a:php:php:5.5.0:beta4
cpe:/a:php:php:5.5.0:rc1
cpe:/a:php:php:5.5.0:rc2
cpe:/a:php:php:5.5.1
cpe:/a:php:php:5.5.2
cpe:/a:php:php:5.5.3
cpe:/a:php:php:5.5.4
cpe:/a:php:php:5.5.5
cpe:/a:php:php:5.5.6
cpe:/a:php:php:5.5.7
cpe:/a:php:php:5.5.8

Date published: 2014-02-18T06:55:17.057-05:00

Date last modified: 2014-03-08T00:13:16.573-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.ubuntu.com/usn/USN-2126-1

Summary: ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.