CVE-2014-9653CVE-2014-9653

Affected configuration(s):

cpe:/a:file_project:file:5.21
cpe:/a:php:php:5.4.36
cpe:/a:php:php:5.5.0
cpe:/a:php:php:5.5.0:alpha1
cpe:/a:php:php:5.5.0:alpha2
cpe:/a:php:php:5.5.0:alpha3
cpe:/a:php:php:5.5.0:alpha4
cpe:/a:php:php:5.5.0:alpha5
cpe:/a:php:php:5.5.0:alpha6
cpe:/a:php:php:5.5.0:beta1
cpe:/a:php:php:5.5.0:beta2
cpe:/a:php:php:5.5.0:beta3
cpe:/a:php:php:5.5.0:beta4
cpe:/a:php:php:5.5.0:rc1
cpe:/a:php:php:5.5.0:rc2
cpe:/a:php:php:5.5.1
cpe:/a:php:php:5.5.2
cpe:/a:php:php:5.5.3
cpe:/a:php:php:5.5.4
cpe:/a:php:php:5.5.5
cpe:/a:php:php:5.5.6
cpe:/a:php:php:5.5.7
cpe:/a:php:php:5.5.8
cpe:/a:php:php:5.5.9
cpe:/a:php:php:5.5.10
cpe:/a:php:php:5.5.11
cpe:/a:php:php:5.5.12
cpe:/a:php:php:5.5.13
cpe:/a:php:php:5.5.14
cpe:/a:php:php:5.5.15
cpe:/a:php:php:5.5.16
cpe:/a:php:php:5.5.17
cpe:/a:php:php:5.5.18
cpe:/a:php:php:5.5.19
cpe:/a:php:php:5.5.20
cpe:/a:php:php:5.6.0:alpha1
cpe:/a:php:php:5.6.0:alpha2
cpe:/a:php:php:5.6.0:alpha3
cpe:/a:php:php:5.6.0:alpha4
cpe:/a:php:php:5.6.0:alpha5
cpe:/a:php:php:5.6.0:beta1
cpe:/a:php:php:5.6.0:beta2
cpe:/a:php:php:5.6.0:beta3
cpe:/a:php:php:5.6.0:beta4
cpe:/a:php:php:5.6.1
cpe:/a:php:php:5.6.2
cpe:/a:php:php:5.6.3
cpe:/a:php:php:5.6.4
cpe:/o:debian:debian_linux:7.0

Date published: 2015-03-30T06:59:03.583-04:00

Date last modified: 2017-06-30T21:29:09.747-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://bugs.gw.com/view.php?id=409

Summary: readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.