CVE-2014-3669CVE-2014-3669

Affected configuration(s):

cpe:/a:php:php:5.4.0
cpe:/a:php:php:5.4.1
cpe:/a:php:php:5.4.2
cpe:/a:php:php:5.4.3
cpe:/a:php:php:5.4.4
cpe:/a:php:php:5.4.5
cpe:/a:php:php:5.4.6
cpe:/a:php:php:5.4.7
cpe:/a:php:php:5.4.8
cpe:/a:php:php:5.4.9
cpe:/a:php:php:5.4.10
cpe:/a:php:php:5.4.11
cpe:/a:php:php:5.4.12
cpe:/a:php:php:5.4.12:rc1
cpe:/a:php:php:5.4.12:rc2
cpe:/a:php:php:5.4.13
cpe:/a:php:php:5.4.13:rc1
cpe:/a:php:php:5.4.14
cpe:/a:php:php:5.4.14:rc1
cpe:/a:php:php:5.4.15:rc1
cpe:/a:php:php:5.4.16:rc1
cpe:/a:php:php:5.4.17
cpe:/a:php:php:5.4.18
cpe:/a:php:php:5.4.19
cpe:/a:php:php:5.4.20
cpe:/a:php:php:5.4.21
cpe:/a:php:php:5.4.22
cpe:/a:php:php:5.4.23
cpe:/a:php:php:5.4.24
cpe:/a:php:php:5.4.25
cpe:/a:php:php:5.4.26
cpe:/a:php:php:5.4.27
cpe:/a:php:php:5.4.28
cpe:/a:php:php:5.4.29
cpe:/a:php:php:5.4.30
cpe:/a:php:php:5.4.31
cpe:/a:php:php:5.4.32
cpe:/a:php:php:5.4.33
cpe:/a:php:php:5.5.0
cpe:/a:php:php:5.5.0:alpha1
cpe:/a:php:php:5.5.0:alpha2
cpe:/a:php:php:5.5.0:alpha3
cpe:/a:php:php:5.5.0:alpha4
cpe:/a:php:php:5.5.0:alpha5
cpe:/a:php:php:5.5.0:alpha6
cpe:/a:php:php:5.5.0:beta1
cpe:/a:php:php:5.5.0:beta2
cpe:/a:php:php:5.5.0:beta3
cpe:/a:php:php:5.5.0:beta4
cpe:/a:php:php:5.5.0:rc1
cpe:/a:php:php:5.5.0:rc2
cpe:/a:php:php:5.5.1
cpe:/a:php:php:5.5.2
cpe:/a:php:php:5.5.3
cpe:/a:php:php:5.5.4
cpe:/a:php:php:5.5.5
cpe:/a:php:php:5.5.6
cpe:/a:php:php:5.5.7
cpe:/a:php:php:5.5.8
cpe:/a:php:php:5.5.9
cpe:/a:php:php:5.5.10
cpe:/a:php:php:5.5.11
cpe:/a:php:php:5.5.12
cpe:/a:php:php:5.5.13
cpe:/a:php:php:5.5.14
cpe:/a:php:php:5.5.15
cpe:/a:php:php:5.5.16
cpe:/a:php:php:5.5.17
cpe:/a:php:php:5.6.0
cpe:/a:php:php:5.6.1

Date published: 2014-10-29T06:55:03.820-04:00

Date last modified: 2017-01-02T21:59:05.717-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159

Summary: Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.