CVE-2014-9705CVE-2014-9705

Affected configuration(s):

cpe:/a:php:php:5.4.37
cpe:/a:php:php:5.5.0
cpe:/a:php:php:5.5.0:alpha1
cpe:/a:php:php:5.5.0:alpha2
cpe:/a:php:php:5.5.0:alpha3
cpe:/a:php:php:5.5.0:alpha4
cpe:/a:php:php:5.5.0:alpha5
cpe:/a:php:php:5.5.0:alpha6
cpe:/a:php:php:5.5.0:beta1
cpe:/a:php:php:5.5.0:beta2
cpe:/a:php:php:5.5.0:beta3
cpe:/a:php:php:5.5.0:beta4
cpe:/a:php:php:5.5.0:rc1
cpe:/a:php:php:5.5.0:rc2
cpe:/a:php:php:5.5.1
cpe:/a:php:php:5.5.2
cpe:/a:php:php:5.5.3
cpe:/a:php:php:5.5.4
cpe:/a:php:php:5.5.5
cpe:/a:php:php:5.5.6
cpe:/a:php:php:5.5.7
cpe:/a:php:php:5.5.8
cpe:/a:php:php:5.5.9
cpe:/a:php:php:5.5.10
cpe:/a:php:php:5.5.11
cpe:/a:php:php:5.5.12
cpe:/a:php:php:5.5.13
cpe:/a:php:php:5.5.14
cpe:/a:php:php:5.5.15
cpe:/a:php:php:5.5.16
cpe:/a:php:php:5.5.17
cpe:/a:php:php:5.5.18
cpe:/a:php:php:5.5.19
cpe:/a:php:php:5.5.20
cpe:/a:php:php:5.5.21
cpe:/a:php:php:5.6.0:alpha1
cpe:/a:php:php:5.6.0:alpha2
cpe:/a:php:php:5.6.0:alpha3
cpe:/a:php:php:5.6.0:alpha4
cpe:/a:php:php:5.6.0:alpha5
cpe:/a:php:php:5.6.0:beta1
cpe:/a:php:php:5.6.0:beta2
cpe:/a:php:php:5.6.0:beta3
cpe:/a:php:php:5.6.0:beta4
cpe:/a:php:php:5.6.1
cpe:/a:php:php:5.6.2
cpe:/a:php:php:5.6.3
cpe:/a:php:php:5.6.4
cpe:/a:php:php:5.6.5

Date published: 2015-03-30T06:59:04.567-04:00

Date last modified: 2016-12-30T21:59:15.297-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html

Summary: Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.