Vulnerabilites related to file_project - file
Vulnerability from fkie_nvd
Published
2015-03-30 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | * | |
php | php | * | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.1 | |
php | php | 5.5.2 | |
php | php | 5.5.3 | |
php | php | 5.5.4 | |
php | php | 5.5.5 | |
php | php | 5.5.6 | |
php | php | 5.5.7 | |
php | php | 5.5.8 | |
php | php | 5.5.9 | |
php | php | 5.5.10 | |
php | php | 5.5.11 | |
php | php | 5.5.12 | |
php | php | 5.5.13 | |
php | php | 5.5.14 | |
php | php | 5.5.15 | |
php | php | 5.5.16 | |
php | php | 5.5.17 | |
php | php | 5.5.18 | |
php | php | 5.5.19 | |
php | php | 5.5.20 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.1 | |
php | php | 5.6.2 | |
php | php | 5.6.3 | |
php | php | 5.6.4 | |
debian | debian_linux | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "00EBCF06-4096-4591-8AB4-7FAFC84B476C", versionEndIncluding: "5.21", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "732F5864-E1EA-497E-A3B9-768138BE237A", versionEndIncluding: "5.4.36", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", matchCriteriaId: "9F6D9B19-E64D-4BED-9194-17460CE19E6F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "3D25E591-448C-4E3B-8557-6E48F7571796", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "3AF783C9-26E7-4E02-BD41-77B9783667E3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "7AEDF6F7-001D-4A35-A26F-417991AD377F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", matchCriteriaId: "4031DB99-B4B4-41EC-B3C1-543D92C575A9", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", matchCriteriaId: "D5450EA7-A398-49D2-AA8E-7C95B074BAB1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", matchCriteriaId: "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", matchCriteriaId: "BB8E09D8-9CBE-4279-88B7-24A214A5A537", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", matchCriteriaId: "2D41ECCE-887D-49A2-9BB3-B559495AC55B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", matchCriteriaId: "79B418BC-27F4-4443-A0F7-FF4ADA568C1B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", matchCriteriaId: "8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", matchCriteriaId: "F644EA6C-50C6-4A1C-A4AC-287AA9477B46", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", matchCriteriaId: "4DD47F30-74F5-48E8-8657-C2373FE2BD22", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", matchCriteriaId: "0C09527B-6B47-41F8-BDE6-01C47E452286", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", matchCriteriaId: "2E454D87-23CB-4D7F-90FE-942EE54D661F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", matchCriteriaId: "1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", matchCriteriaId: "130E50C1-D209-4CFF-9399-69D561340FBB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", matchCriteriaId: "C1F29948-9417-460B-8B04-D91AE4E8B423", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", matchCriteriaId: "A37D00C1-4F41-4400-9CE4-8E8BAA3E4142", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", matchCriteriaId: "093D08B7-CC3C-4616-8697-F15B253A7D9A", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", matchCriteriaId: "E9CD8FEE-DE7B-47CB-9985-4092BFA071D0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", matchCriteriaId: "A30B2D9E-F289-43C9-BFBC-1CEF284A417E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", matchCriteriaId: "FE41CFDF-8ECD-41C1-94A7-5AFD42C5DDEA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", matchCriteriaId: "6AEAC9BA-AF82-4345-839C-D339DCB962A7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", matchCriteriaId: "1EFE682F-52E3-48EC-A993-F522FC29712F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*", matchCriteriaId: "840EE3AC-5293-4F33-9E2C-96A0A2534B02", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*", matchCriteriaId: "1C0FC407-96DB-425E-BB57-7A5BA839C37F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*", matchCriteriaId: "D3839C81-3DAB-4E1D-9D95-BEFFD491F43D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*", matchCriteriaId: "AC63A449-5D92-4F5F-8186-B58FFFBA54FE", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*", matchCriteriaId: "F18236F6-2065-4A6A-93E7-FD90E650C689", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*", matchCriteriaId: "DEFBA84A-A4E4-438B-B9B5-8549809DCECC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "5BF4E8FF-A3EC-43E8-A0C1-FD38AFCB77B8", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "54ADECFC-3C07-43BC-B296-6C25AC7F1C95", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "FE192054-2FBB-4388-A52A-422E20DEA2D7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "F0195D48-3B42-4AC0-B9C5-436E01C63879", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "BF0E5D67-ABC1-41A5-94E1-7DD3CDB51D81", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*", matchCriteriaId: "319E0573-B1AD-40B6-B4BC-8BE67ED3EFDB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*", matchCriteriaId: "1A7C00EB-87B7-4EB7-A4AC-8665D8C78467", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*", matchCriteriaId: "21BFCF10-786A-4D1E-9C37-50A1EC6056F1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*", matchCriteriaId: "95A6D6C8-5F46-4897-A0B0-778631E8CE6A", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*", matchCriteriaId: "F1F13E2D-A8F7-4B74-8D03-7905C81672C9", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*", matchCriteriaId: "AE18933A-5FE6-41C7-B1B6-DA3E762C3FB6", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*", matchCriteriaId: "9AE1289F-03A6-4621-B387-5F5ADAC4AE92", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*", matchCriteriaId: "383697F5-D29E-475A-84F3-46B54A928889", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.", }, { lang: "es", value: "readelf.c en file anterior a 5.22, utilizado en el componente Fileinfo en PHP anterior a 5.4.37, 5.5.x anterior a 5.5.21, y 5.6.x anterior a 5.6.5, no considera que las llamadas a pread a veces leen solamente un subjuego de los datos disponibles, lo que permite a atacantes remotos causar una denegación de servicio (acceso a memoria no inicializada) o posiblemente tener otro impacto a través de un fichero ELF manipulado.", }, ], id: "CVE-2014-9653", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-03-30T10:59:03.583", references: [ { source: "cve@mitre.org", url: "http://bugs.gw.com/view.php?id=409", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "cve@mitre.org", url: "http://mx.gw.com/pipermail/file/2014/001649.html", }, { source: "cve@mitre.org", url: "http://openwall.com/lists/oss-security/2015/02/05/13", }, { source: "cve@mitre.org", url: "http://php.net/ChangeLog-5.php", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2015/dsa-3196", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/72516", }, { source: "cve@mitre.org", url: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201701-42", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3686-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.gw.com/view.php?id=409", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://mx.gw.com/pipermail/file/2014/001649.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://openwall.com/lists/oss-security/2015/02/05/13", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2015/dsa-3196", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/72516", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201701-42", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3686-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-03-30 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
php | php | * | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.0 | |
php | php | 5.5.1 | |
php | php | 5.5.2 | |
php | php | 5.5.3 | |
php | php | 5.5.4 | |
php | php | 5.5.5 | |
php | php | 5.5.6 | |
php | php | 5.5.7 | |
php | php | 5.5.8 | |
php | php | 5.5.9 | |
php | php | 5.5.10 | |
php | php | 5.5.11 | |
php | php | 5.5.12 | |
php | php | 5.5.13 | |
php | php | 5.5.14 | |
php | php | 5.5.15 | |
php | php | 5.5.16 | |
php | php | 5.5.17 | |
php | php | 5.5.18 | |
php | php | 5.5.19 | |
php | php | 5.5.20 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.0 | |
php | php | 5.6.1 | |
php | php | 5.6.2 | |
php | php | 5.6.3 | |
php | php | 5.6.4 | |
file_project | file | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "732F5864-E1EA-497E-A3B9-768138BE237A", versionEndIncluding: "5.4.36", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", matchCriteriaId: "9F6D9B19-E64D-4BED-9194-17460CE19E6F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "3D25E591-448C-4E3B-8557-6E48F7571796", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "3AF783C9-26E7-4E02-BD41-77B9783667E3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "7AEDF6F7-001D-4A35-A26F-417991AD377F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", matchCriteriaId: "4031DB99-B4B4-41EC-B3C1-543D92C575A9", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", matchCriteriaId: "D5450EA7-A398-49D2-AA8E-7C95B074BAB1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", matchCriteriaId: "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", matchCriteriaId: "BB8E09D8-9CBE-4279-88B7-24A214A5A537", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", matchCriteriaId: "2D41ECCE-887D-49A2-9BB3-B559495AC55B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", matchCriteriaId: "79B418BC-27F4-4443-A0F7-FF4ADA568C1B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", matchCriteriaId: "8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", matchCriteriaId: "F644EA6C-50C6-4A1C-A4AC-287AA9477B46", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", matchCriteriaId: "4DD47F30-74F5-48E8-8657-C2373FE2BD22", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", matchCriteriaId: "0C09527B-6B47-41F8-BDE6-01C47E452286", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", matchCriteriaId: "2E454D87-23CB-4D7F-90FE-942EE54D661F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", matchCriteriaId: "1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", matchCriteriaId: "130E50C1-D209-4CFF-9399-69D561340FBB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", matchCriteriaId: "C1F29948-9417-460B-8B04-D91AE4E8B423", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", matchCriteriaId: "A37D00C1-4F41-4400-9CE4-8E8BAA3E4142", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", matchCriteriaId: "093D08B7-CC3C-4616-8697-F15B253A7D9A", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", matchCriteriaId: "E9CD8FEE-DE7B-47CB-9985-4092BFA071D0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", matchCriteriaId: "A30B2D9E-F289-43C9-BFBC-1CEF284A417E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", matchCriteriaId: "FE41CFDF-8ECD-41C1-94A7-5AFD42C5DDEA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", matchCriteriaId: "6AEAC9BA-AF82-4345-839C-D339DCB962A7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", matchCriteriaId: "1EFE682F-52E3-48EC-A993-F522FC29712F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*", matchCriteriaId: "840EE3AC-5293-4F33-9E2C-96A0A2534B02", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*", matchCriteriaId: "1C0FC407-96DB-425E-BB57-7A5BA839C37F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*", matchCriteriaId: "D3839C81-3DAB-4E1D-9D95-BEFFD491F43D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*", matchCriteriaId: "AC63A449-5D92-4F5F-8186-B58FFFBA54FE", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*", matchCriteriaId: "F18236F6-2065-4A6A-93E7-FD90E650C689", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*", matchCriteriaId: "DEFBA84A-A4E4-438B-B9B5-8549809DCECC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "5BF4E8FF-A3EC-43E8-A0C1-FD38AFCB77B8", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "54ADECFC-3C07-43BC-B296-6C25AC7F1C95", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "FE192054-2FBB-4388-A52A-422E20DEA2D7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "F0195D48-3B42-4AC0-B9C5-436E01C63879", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "BF0E5D67-ABC1-41A5-94E1-7DD3CDB51D81", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*", matchCriteriaId: "319E0573-B1AD-40B6-B4BC-8BE67ED3EFDB", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*", matchCriteriaId: "1A7C00EB-87B7-4EB7-A4AC-8665D8C78467", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*", matchCriteriaId: "21BFCF10-786A-4D1E-9C37-50A1EC6056F1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*", matchCriteriaId: "95A6D6C8-5F46-4897-A0B0-778631E8CE6A", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*", matchCriteriaId: "F1F13E2D-A8F7-4B74-8D03-7905C81672C9", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*", matchCriteriaId: "AE18933A-5FE6-41C7-B1B6-DA3E762C3FB6", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*", matchCriteriaId: "9AE1289F-03A6-4621-B387-5F5ADAC4AE92", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*", matchCriteriaId: "383697F5-D29E-475A-84F3-46B54A928889", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "3E2E14D1-CD34-4C5F-AE83-A6C639BD5BC1", versionEndIncluding: "5.20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.", }, { lang: "es", value: "La función mconvert en softmagic.c en file anterior a 5.21, utilizado en el componente Fileinfo en PHP anterior a 5.4.37, 5.5.x anterior a 5.5.21, y 5.6.x anterior a 5.6.5, no maneja correctamente cierto campo de longitud de cadenas durante una copia de una versión trucada de una cadena Pascal, lo que podría permitir a atacantes remotos causar una denegación de servicio (acceso a memoria fuera de rango y caída de aplicación) a través de un fichero manipulado.", }, ], id: "CVE-2014-9652", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-03-30T10:59:01.347", references: [ { source: "cve@mitre.org", url: "http://bugs.gw.com/view.php?id=398", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "cve@mitre.org", url: "http://openwall.com/lists/oss-security/2015/02/05/12", }, { source: "cve@mitre.org", url: "http://php.net/ChangeLog-5.php", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2015-1053.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2015-1066.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2015-1135.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/72505", }, { source: "cve@mitre.org", url: "https://bugs.php.net/bug.php?id=68735", }, { source: "cve@mitre.org", url: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", }, { source: "cve@mitre.org", url: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201701-42", }, { source: "cve@mitre.org", url: "https://support.apple.com/HT205267", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.gw.com/view.php?id=398", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://openwall.com/lists/oss-security/2015/02/05/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-1053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-1066.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-1135.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/72505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugs.php.net/bug.php?id=68735", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201701-42", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/HT205267", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-18 17:29
Modified
2024-11-21 04:50
Severity ?
Summary
do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/107130 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bugs.astron.com/view.php?id=62 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3911-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107130 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.astron.com/view.php?id=62 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3911-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.35 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*", matchCriteriaId: "E0ABAAD8-0CD0-45B4-ABA4-A5FE24F00F20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.", }, { lang: "es", value: "do_bid_note en readelf.c en libmagic.a en la versión 5.35 de file tiene una sobrelectura de búfer basada en pila.", }, ], id: "CVE-2019-8904", lastModified: "2024-11-21T04:50:37.890", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-18T17:29:00.940", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107130", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=62", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107130", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=62", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-18 17:29
Modified
2024-11-21 04:50
Severity ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.35 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
opensuse | leap | 15.0 | |
opensuse | leap | 42.3 | |
apple | iphone_os | * | |
apple | mac_os_x | * | |
apple | tvos | * | |
apple | watchos | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*", matchCriteriaId: "E0ABAAD8-0CD0-45B4-ABA4-A5FE24F00F20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", matchCriteriaId: "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", matchCriteriaId: "1531E802-5419-4B38-8C0C-BDCBC272648F", versionEndExcluding: "12.2", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", matchCriteriaId: "09CDBB72-2A0D-4321-BA1F-4FB326A5646A", versionEndExcluding: "10.14.4", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", matchCriteriaId: "98912716-69F2-4372-98F0-BD6CCA9AAEB9", versionEndExcluding: "12.2", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", matchCriteriaId: "8962A4FE-AE67-421E-9635-B03E2EBCDF19", versionEndExcluding: "5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.", }, { lang: "es", value: "do_core_note en readelf.c en libmagic.a en la versión 5.35 de file tiene una lectura fuera de límites debido a una mala utilización de memcpy.", }, ], id: "CVE-2019-8906", lastModified: "2024-11-21T04:50:38.213", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-18T17:29:01.033", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=64", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209599", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209600", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209601", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209602", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=64", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209599", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209600", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209601", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT209602", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-01-21 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.16 | |
file_project | file | 5.17 | |
file_project | file | 5.18 | |
file_project | file | 5.19 | |
file_project | file | 5.20 | |
file_project | file | 5.21 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.16:*:*:*:*:*:*:*", matchCriteriaId: "F0007A6A-8D60-4CE5-83CD-5051D425ACBE", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.17:*:*:*:*:*:*:*", matchCriteriaId: "19C062E1-D4D4-4575-A8BC-3C9B708ADF38", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.18:*:*:*:*:*:*:*", matchCriteriaId: "0168CDC1-6539-4BCB-ABAB-59A75EFCFF9A", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.19:*:*:*:*:*:*:*", matchCriteriaId: "49F68401-A652-4FB0-8C10-16C4A99CD682", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*", matchCriteriaId: "46EB72D1-7459-44F9-B984-39721A3934A5", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.21:*:*:*:*:*:*:*", matchCriteriaId: "563E7B5C-B562-4A5F-920E-58004185F205", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.", }, { lang: "es", value: "El analizador ELF en file 5.16 hasta 5.21 permite a atacantes remotos causar una denegación de servicio a través de una cadena larga.", }, ], id: "CVE-2014-9621", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-01-21T18:59:07.153", references: [ { source: "cve@mitre.org", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "cve@mitre.org", url: "http://mx.gw.com/pipermail/file/2014/001654.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { source: "cve@mitre.org", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { source: "cve@mitre.org", url: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201503-08", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3686-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://mx.gw.com/pipermail/file/2014/001654.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201503-08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3686-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-12-17 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | * | |
freebsd | freebsd | * | |
mageia | mageia | 4.0 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "3E2E14D1-CD34-4C5F-AE83-A6C639BD5BC1", versionEndIncluding: "5.20", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", matchCriteriaId: "D9EC02F3-3905-460D-8949-3B26394215CA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*", matchCriteriaId: "F805A106-9A6F-48E7-8582-D3C5A26DFC11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", matchCriteriaId: "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.", }, { lang: "es", value: "softmagic.c en archivo anterior a 5.21 no limita adecuadamente el límite de recursividad, esto permite a atacantes remotos, provocar una denegación de servicio (consumo de CPU o rotura) mediante vectores no especificados.", }, ], id: "CVE-2014-8117", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-12-17T19:59:05.353", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/61944", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/62081", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/71692", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1031344", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2535-1", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61944", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62081", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/71692", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1031344", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2535-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-06-11 10:29
Modified
2024-11-21 03:41
Severity ?
Summary
The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.33 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
opensuse | leap | 15.0 | |
opensuse | leap | 42.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.33:*:*:*:*:*:*:*", matchCriteriaId: "1D602D40-5DD4-4C74-B806-AC5C22A74187", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", matchCriteriaId: "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.", }, { lang: "es", value: "La función do_core_note en readelf.c en libmagic.a en file 5.33 permite a atacantes remotos provocar una denegación de servicio (lectura fuera de límites y cierre inesperado de la aplicación) utilizando un archivo ELF manipulado.", }, ], id: "CVE-2018-10360", lastModified: "2024-11-21T03:41:15.640", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-11T10:29:00.233", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201806-08", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3686-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3686-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201806-08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3686-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3686-2/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-18 17:29
Modified
2024-11-21 04:50
Severity ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.35 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 15.0 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*", matchCriteriaId: "E0ABAAD8-0CD0-45B4-ABA4-A5FE24F00F20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.", }, { lang: "es", value: "do_core_note en readelf.c en libmagic.a en la versión 5.35 de file permite a los atacantes remotos provocar una denegación de servicio (corrupción de pila y cierre inesperado de la aplicación) o cualquier otro impacto no especificado.", }, ], id: "CVE-2019-8907", lastModified: "2024-11-21T04:50:38.367", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-18T17:29:01.080", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=65", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=65", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-01-21 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.08 | |
file_project | file | 5.09 | |
file_project | file | 5.10 | |
file_project | file | 5.11 | |
file_project | file | 5.12 | |
file_project | file | 5.13 | |
file_project | file | 5.14 | |
file_project | file | 5.15 | |
file_project | file | 5.16 | |
file_project | file | 5.17 | |
file_project | file | 5.18 | |
file_project | file | 5.19 | |
file_project | file | 5.20 | |
file_project | file | 5.21 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.08:*:*:*:*:*:*:*", matchCriteriaId: "0A8D21CF-4B6F-4649-94B6-2150B3CBB2D2", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.09:*:*:*:*:*:*:*", matchCriteriaId: "2150DEB7-94C0-42B2-B048-B7C6664EB680", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.10:*:*:*:*:*:*:*", matchCriteriaId: "EFCAD86C-B3B8-4093-986D-E056553A3142", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.11:*:*:*:*:*:*:*", matchCriteriaId: "CF7E5C01-C644-4928-A990-76B35F829E87", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.12:*:*:*:*:*:*:*", matchCriteriaId: "F8876063-C37C-4E5E-A851-92A9014B632C", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.13:*:*:*:*:*:*:*", matchCriteriaId: "6DFAB120-3495-412F-81B7-1B31E20F0864", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.14:*:*:*:*:*:*:*", matchCriteriaId: "3B09FD8A-BF2E-4949-8CF0-D19BFB076303", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.15:*:*:*:*:*:*:*", matchCriteriaId: "6C7198D1-1F9A-42E0-9BC4-EFD0064678B0", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.16:*:*:*:*:*:*:*", matchCriteriaId: "F0007A6A-8D60-4CE5-83CD-5051D425ACBE", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.17:*:*:*:*:*:*:*", matchCriteriaId: "19C062E1-D4D4-4575-A8BC-3C9B708ADF38", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.18:*:*:*:*:*:*:*", matchCriteriaId: "0168CDC1-6539-4BCB-ABAB-59A75EFCFF9A", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.19:*:*:*:*:*:*:*", matchCriteriaId: "49F68401-A652-4FB0-8C10-16C4A99CD682", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*", matchCriteriaId: "46EB72D1-7459-44F9-B984-39721A3934A5", vulnerable: true, }, { criteria: "cpe:2.3:a:file_project:file:5.21:*:*:*:*:*:*:*", matchCriteriaId: "563E7B5C-B562-4A5F-920E-58004185F205", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.", }, { lang: "es", value: "El analizador ELF en file 5.08 hasta 5.21 permite a atacantes remotos causar una denegación de servicio a través de un número grande de notas.", }, ], id: "CVE-2014-9620", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-01-21T18:59:05.937", references: [ { source: "cve@mitre.org", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "cve@mitre.org", url: "http://mx.gw.com/pipermail/file/2014/001653.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2015/dsa-3121", }, { source: "cve@mitre.org", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/71715", }, { source: "cve@mitre.org", url: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201503-08", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3686-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://mx.gw.com/pipermail/file/2014/001653.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2015/dsa-3121", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/71715", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201503-08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3686-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-12-17 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.20 | |
freebsd | freebsd | * | |
mageia | mageia | 4.0 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*", matchCriteriaId: "46EB72D1-7459-44F9-B984-39721A3934A5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", matchCriteriaId: "D9EC02F3-3905-460D-8949-3B26394215CA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*", matchCriteriaId: "F805A106-9A6F-48E7-8582-D3C5A26DFC11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", matchCriteriaId: "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.", }, { lang: "es", value: "El intérprete ELF (readelf.c) en versiones anteriores a 5.21, permite a atacantes remotos, provocar una denegaci?o de servicio (consumo de CPU o rotura) mediante un número largo de (1) programa o (2) cabeceras de sección o (3) capacidades no válidas.", }, ], id: "CVE-2014-8116", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-12-17T19:59:02.637", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/61944", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/62081", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "secalert@redhat.com", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/71700", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1031344", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61944", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62081", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/71700", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1031344", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-14 15:55
Modified
2025-04-12 10:46
Severity ?
Summary
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | * | |
php | php | * | |
php | php | * | |
debian | debian_linux | 6.0 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.10 | |
opensuse | opensuse | 11.4 | |
opensuse | opensuse | 12.3 | |
opensuse | opensuse | 13.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "5A3FD268-A258-49C8-B334-41714D6E9A09", versionEndExcluding: "5.17", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "D56E9C09-9D0F-4DE6-B5F7-C38CA2F69009", versionEndExcluding: "5.4.26", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "B8ED3B2D-7952-49A4-A253-3B566A648E1D", versionEndExcluding: "5.5.10", versionStartIncluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", matchCriteriaId: "036E8A89-7A16-411F-9D31-676313BB7244", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", matchCriteriaId: "01EDA41C-6B2E-49AF-B503-EB3882265C11", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.", }, { lang: "es", value: "softmagic.c en archivo anterior a 5.17 y libmagic permite a atacantes dependientes de contexto causar una denegación de servicio (acceso a memoria fuera de rango y caída) a través de desplazamientos (“offsets”) manipulados en el softmagic de un ejecutable PE.", }, ], id: "CVE-2014-2270", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-14T15:55:05.667", references: [ { source: "security@debian.org", tags: [ "Broken Link", "Patch", ], url: "http://bugs.gw.com/view.php?id=313", }, { source: "security@debian.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html", }, { source: "security@debian.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html", }, { source: "security@debian.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "security@debian.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/473", }, { source: "security@debian.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/504", }, { source: "security@debian.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/505", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2873", }, { source: "security@debian.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2162-1", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2163-1", }, { source: "security@debian.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201503-08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Patch", ], url: "http://bugs.gw.com/view.php?id=313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/473", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/504", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://seclists.org/oss-sec/2014/q1/505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2873", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2162-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2163-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201503-08", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-07-09 11:07
Modified
2025-04-12 10:46
Severity ?
Summary
The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "DD2CDF20-5D28-4F7D-9965-FBED2F024630", versionEndExcluding: "5.19", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "388E0CDF-737F-437E-B4D9-1001E0651387", versionEndExcluding: "5.3.29", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "AD052020-AA37-4F49-A0FE-EA99616C12C7", versionEndExcluding: "5.4.30", versionStartIncluding: "5.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "4ADC6057-9D35-4D87-B15D-F6F52A283464", versionEndExcluding: "5.5.14", versionStartIncluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", matchCriteriaId: "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.", }, { lang: "es", value: "La función cdf_check_stream_offset en cdf.c en file anterior a 5.19, utilizado en el componente Fileinfo en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14, depende de datos de tamaño de sectores incorrectos, lo que permite a atacantes remotos causar una denegación de servicio (caída de aplicación) a través de un desplazamiento de flujo manipulado en un fichero CDF.", }, ], id: "CVE-2014-3479", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-07-09T11:07:01.633", references: [ { source: "secalert@redhat.com", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "secalert@redhat.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68241", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67411", }, { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68241", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-21 05:15
Modified
2024-11-21 04:32
Severity ?
Summary
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | leap | 15.1 | |
netapp | active_iq_unified_manager | * | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
canonical | ubuntu_linux | 19.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "E1772C1F-4B0A-483E-ACC7-AD225B58532B", versionEndIncluding: "5.37", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", matchCriteriaId: "9FBC1BD0-FF12-4691-8751-5F245D991989", versionStartIncluding: "7.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", matchCriteriaId: "D100F7CE-FC64-4CC6-852A-6136D72DA419", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).", }, { lang: "es", value: "La función cdf_read_property_info en el archivo cdf.c en file versiones hasta 5.37, no restringe el número de elementos CDF_VECTOR, lo que permite un desbordamiento del búfer en la región heap de la memoria (escritura fuera de límites de 4 bytes).", }, ], id: "CVE-2019-18218", lastModified: "2024-11-21T04:32:51.430", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-21T05:15:10.520", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202003-24", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200115-0001/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4172-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4172-2/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4550", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202003-24", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200115-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4172-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4172-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4550", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-07-09 11:07
Modified
2025-04-12 10:46
Severity ?
Summary
The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "DD2CDF20-5D28-4F7D-9965-FBED2F024630", versionEndExcluding: "5.19", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "388E0CDF-737F-437E-B4D9-1001E0651387", versionEndExcluding: "5.3.29", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "AD052020-AA37-4F49-A0FE-EA99616C12C7", versionEndExcluding: "5.4.30", versionStartIncluding: "5.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "4ADC6057-9D35-4D87-B15D-F6F52A283464", versionEndExcluding: "5.5.14", versionStartIncluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", matchCriteriaId: "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.", }, { lang: "es", value: "La función cdf_count_chain function en cdf.c en file anterior a 5.19, utilizado en el componente Fileinfo en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14, no valida debidamente datos de la cuenta de sectores, lo que permite a atacantes remotos causar una denegación de servicio (caída de aplicación) a través de un fichero CDF manipulado.", }, ], id: "CVE-2014-3480", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-07-09T11:07:01.680", references: [ { source: "secalert@redhat.com", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "secalert@redhat.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68238", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67412", }, { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68238", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67412", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-08-22 19:16
Modified
2024-11-21 07:33
Severity ?
Summary
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.41 | |
debian | debian_linux | 11.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.41:*:*:*:*:*:*:*", matchCriteriaId: "F684BBD1-49E6-475A-8D47-4A07436B1081", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \"File\" is the name of an Open Source project.", }, ], id: "CVE-2022-48554", lastModified: "2024-11-21T07:33:30.423", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-22T19:16:31.757", references: [ { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2024/Mar/21", }, { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2024/Mar/24", }, { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2024/Mar/25", }, { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "https://bugs.astron.com/view.php?id=310", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20231116-0002/", }, { source: "cve@mitre.org", url: "https://support.apple.com/kb/HT214081", }, { source: "cve@mitre.org", url: "https://support.apple.com/kb/HT214084", }, { source: "cve@mitre.org", url: "https://support.apple.com/kb/HT214086", }, { source: "cve@mitre.org", url: "https://support.apple.com/kb/HT214088", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5489", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2024/Mar/21", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2024/Mar/24", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2024/Mar/25", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "https://bugs.astron.com/view.php?id=310", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20231116-0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/kb/HT214081", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/kb/HT214084", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/kb/HT214086", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/kb/HT214088", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5489", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-11 19:29
Modified
2025-04-20 01:37
Severity ?
Summary
An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
file_project | file | 5.29 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.29:*:*:*:*:*:*:*", matchCriteriaId: "AA05566A-1567-4115-B62B-7B268A84050A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).", }, { lang: "es", value: "Se introdujo un fallo en la función file() en un commit con ID 9611f31313a93aa036389c5f3b15eea53510d4d1 (octubre 2016) que permite a un atacante sobrescribir un búfer de pila fijo de 20 bytes con una sección .notes especialmente manipulada en un archivo binario ELF. Esto se solucionó en el commit con ID 35c94dc6acc418f1ad7f6241a6680e5327495793 (agosto 2017).", }, ], id: "CVE-2017-1000249", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-11T19:29:00.200", references: [ { source: "cve@mitre.org", url: "http://www.debian.org/security/2017/dsa-3965", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201710-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3965", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201710-02", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-18 17:29
Modified
2024-11-21 04:50
Severity ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 8.0 | |
file_project | file | 5.35 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
opensuse | leap | 15.0 | |
opensuse | leap | 42.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*", matchCriteriaId: "E0ABAAD8-0CD0-45B4-ABA4-A5FE24F00F20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", matchCriteriaId: "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.", }, { lang: "es", value: "do_core_note en readelf.c en libmagic.a en la versión 5.35 de file tiene una sobrelectura de búfer basada en pila relacionada con file_printable. Esta vulnerabilidad es diferente de CVE-2018-10360.", }, ], id: "CVE-2019-8905", lastModified: "2024-11-21T04:50:38.040", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-18T17:29:00.987", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107137", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=63", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107137", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.astron.com/view.php?id=63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3911-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-07-09 11:07
Modified
2025-04-12 10:46
Severity ?
Summary
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*", matchCriteriaId: "DD2CDF20-5D28-4F7D-9965-FBED2F024630", versionEndExcluding: "5.19", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "388E0CDF-737F-437E-B4D9-1001E0651387", versionEndExcluding: "5.3.29", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "AD052020-AA37-4F49-A0FE-EA99616C12C7", versionEndExcluding: "5.4.30", versionStartIncluding: "5.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", matchCriteriaId: "4ADC6057-9D35-4D87-B15D-F6F52A283464", versionEndExcluding: "5.5.14", versionStartIncluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", matchCriteriaId: "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.", }, { lang: "es", value: "La función cdf_read_property_info en file anterior a 5.19, utilizado en el componente Fileinfo en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14, no valida debidamente un desplazamiento de flujo, lo que permite a atacantes remotos causar una denegación de servicio (caída de aplicación) a través de un fichero CDF manipulado.", }, ], id: "CVE-2014-3487", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-07-09T11:07:01.727", references: [ { source: "secalert@redhat.com", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "secalert@redhat.com", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "secalert@redhat.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68120", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67413", }, { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59794", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://secunia.com/advisories/59831", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://support.apple.com/kb/HT6443", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.php.net/ChangeLog-5.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/68120", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.php.net/bug.php?id=67413", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/HT204659", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2014-8117
Vulnerability from cvelistv5
Published
2014-12-17 19:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:10:50.944Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-2535-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2535-1", }, { name: "71692", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71692", }, { name: "61944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61944", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "USN-2494-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", }, { name: "1031344", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-10T00:00:00", descriptions: [ { lang: "en", value: "softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-2535-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2535-1", }, { name: "71692", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71692", }, { name: "61944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61944", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "USN-2494-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", }, { name: "1031344", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-8117", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-2535-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2535-1", }, { name: "71692", refsource: "BID", url: "http://www.securityfocus.com/bid/71692", }, { name: "61944", refsource: "SECUNIA", url: "http://secunia.com/advisories/61944", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "RHSA-2016:0760", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "USN-2494-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2494-1", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", refsource: "CONFIRM", url: "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", }, { name: "1031344", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", refsource: "SECUNIA", url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q4/1056", }, { name: "http://advisories.mageia.org/MGASA-2015-0040.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { name: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", refsource: "CONFIRM", url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-8117", datePublished: "2014-12-17T19:00:00", dateReserved: "2014-10-10T00:00:00", dateUpdated: "2024-08-06T13:10:50.944Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-9621
Vulnerability from cvelistv5
Published
2015-01-21 18:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/17/9 | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3686-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://mx.gw.com/pipermail/file/2014/001654.html | mailing-list, x_refsource_MLIST | |
http://mx.gw.com/pipermail/file/2015/001660.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/201503-08 | vendor-advisory, x_refsource_GENTOO | |
http://advisories.mageia.org/MGASA-2015-0040.html | x_refsource_CONFIRM | |
https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:47:41.915Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "[File] 20141216 file 5.21 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001654.html", }, { name: "[File] 20150102 file 5.22 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-08", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-16T00:00:00", descriptions: [ { lang: "en", value: "The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-15T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "[File] 20141216 file 5.21 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001654.html", }, { name: "[File] 20150102 file 5.22 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201503-08", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9621", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { name: "USN-3686-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3686-1/", }, { name: "[File] 20141216 file 5.21 is now available", refsource: "MLIST", url: "http://mx.gw.com/pipermail/file/2014/001654.html", }, { name: "[File] 20150102 file 5.22 is now available", refsource: "MLIST", url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "GLSA-201503-08", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201503-08", }, { name: "http://advisories.mageia.org/MGASA-2015-0040.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { name: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", refsource: "CONFIRM", url: "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9621", datePublished: "2015-01-21T18:00:00", dateReserved: "2015-01-17T00:00:00", dateUpdated: "2024-08-06T13:47:41.915Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-18218
Vulnerability from cvelistv5
Published
2019-10-21 04:41
Modified
2024-08-05 01:47
Severity ?
EPSS score ?
Summary
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T01:47:13.995Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", }, { name: "[debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html", }, { name: "DSA-4550", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4550", }, { name: "USN-4172-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4172-1/", }, { name: "USN-4172-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4172-2/", }, { name: "FEDORA-2019-554c3c691f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/", }, { name: "FEDORA-2019-97dcb2762a", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/", }, { name: "FEDORA-2019-18036b898e", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200115-0001/", }, { name: "GLSA-202003-24", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202003-24", }, { name: "openSUSE-SU-2020:0677", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html", }, { name: "[debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-15T14:06:16", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", }, { name: "[debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html", }, { name: "DSA-4550", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4550", }, { name: "USN-4172-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4172-1/", }, { name: "USN-4172-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4172-2/", }, { name: "FEDORA-2019-554c3c691f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/", }, { name: "FEDORA-2019-97dcb2762a", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/", }, { name: "FEDORA-2019-18036b898e", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200115-0001/", }, { name: "GLSA-202003-24", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202003-24", }, { name: "openSUSE-SU-2020:0677", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html", }, { name: "[debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-18218", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", refsource: "MISC", url: "https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84", }, { name: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", refsource: "MISC", url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780", }, { name: "[debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html", }, { name: "DSA-4550", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4550", }, { name: "USN-4172-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4172-1/", }, { name: "USN-4172-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4172-2/", }, { name: "FEDORA-2019-554c3c691f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/", }, { name: "FEDORA-2019-97dcb2762a", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/", }, { name: "FEDORA-2019-18036b898e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/", }, { name: "https://security.netapp.com/advisory/ntap-20200115-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200115-0001/", }, { name: "GLSA-202003-24", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202003-24", }, { name: "openSUSE-SU-2020:0677", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html", }, { name: "[debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-18218", datePublished: "2019-10-21T04:41:56", dateReserved: "2019-10-21T00:00:00", dateUpdated: "2024-08-05T01:47:13.995Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-8907
Vulnerability from cvelistv5
Published
2019-02-18 17:00
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.
References
▼ | URL | Tags |
---|---|---|
https://bugs.astron.com/view.php?id=65 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html | vendor-advisory, x_refsource_SUSE | |
https://usn.ubuntu.com/3911-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T21:31:37.482Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.astron.com/view.php?id=65", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-02-18T00:00:00", descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-12T11:06:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugs.astron.com/view.php?id=65", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-8907", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.astron.com/view.php?id=65", refsource: "MISC", url: "https://bugs.astron.com/view.php?id=65", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { name: "openSUSE-SU-2019:0345", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-8907", datePublished: "2019-02-18T17:00:00", dateReserved: "2019-02-18T00:00:00", dateUpdated: "2024-08-04T21:31:37.482Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-8906
Vulnerability from cvelistv5
Published
2019-02-18 17:00
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
References
▼ | URL | Tags |
---|---|---|
https://bugs.astron.com/view.php?id=64 | x_refsource_MISC | |
https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html | vendor-advisory, x_refsource_SUSE | |
https://usn.ubuntu.com/3911-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://support.apple.com/kb/HT209599 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT209601 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT209600 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT209602 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T21:31:37.463Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.astron.com/view.php?id=64", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3911-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT209599", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT209601", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT209600", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT209602", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-02-18T00:00:00", descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-16T09:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugs.astron.com/view.php?id=64", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3911-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT209599", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT209601", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT209600", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT209602", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-8906", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.astron.com/view.php?id=64", refsource: "MISC", url: "https://bugs.astron.com/view.php?id=64", }, { name: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", refsource: "MISC", url: "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", }, { name: "openSUSE-SU-2019:0345", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3911-1/", }, { name: "https://support.apple.com/kb/HT209599", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT209599", }, { name: "https://support.apple.com/kb/HT209601", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT209601", }, { name: "https://support.apple.com/kb/HT209600", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT209600", }, { name: "https://support.apple.com/kb/HT209602", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT209602", }, { name: "openSUSE-SU-2019:1197", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-8906", datePublished: "2019-02-18T17:00:00", dateReserved: "2019-02-18T00:00:00", dateUpdated: "2024-08-04T21:31:37.463Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-8905
Vulnerability from cvelistv5
Published
2019-02-18 17:00
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107137 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html | mailing-list, x_refsource_MLIST | |
https://bugs.astron.com/view.php?id=63 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html | vendor-advisory, x_refsource_SUSE | |
https://usn.ubuntu.com/3911-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T21:31:37.515Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "107137", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107137", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.astron.com/view.php?id=63", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-02-18T00:00:00", descriptions: [ { lang: "en", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-12T11:06:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "107137", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107137", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.astron.com/view.php?id=63", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-8905", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "107137", refsource: "BID", url: "http://www.securityfocus.com/bid/107137", }, { name: "[debian-lts-announce] 20190228 [SECURITY] [DLA 1698-1] file security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00044.html", }, { name: "https://bugs.astron.com/view.php?id=63", refsource: "MISC", url: "https://bugs.astron.com/view.php?id=63", }, { name: "openSUSE-SU-2019:0345", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "USN-3911-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3911-1/", }, { name: "openSUSE-SU-2019:1197", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-8905", datePublished: "2019-02-18T17:00:00", dateReserved: "2019-02-18T00:00:00", dateUpdated: "2024-08-04T21:31:37.515Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2270
Vulnerability from cvelistv5
Published
2014-03-14 15:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.288Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-2163-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2163-1", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q1/504", }, { name: "USN-2162-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2162-1", }, { name: "[oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q1/473", }, { name: "openSUSE-SU-2014:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gw.com/view.php?id=313", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q1/505", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "openSUSE-SU-2014:0364", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-08", }, { name: "openSUSE-SU-2014:0435", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html", }, { name: "DSA-2873", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2873", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-11T00:00:00", descriptions: [ { lang: "en", value: "softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "USN-2163-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2163-1", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q1/504", }, { name: "USN-2162-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2162-1", }, { name: "[oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q1/473", }, { name: "openSUSE-SU-2014:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gw.com/view.php?id=313", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q1/505", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "openSUSE-SU-2014:0364", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201503-08", }, { name: "openSUSE-SU-2014:0435", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html", }, { name: "DSA-2873", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2873", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-2270", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-2163-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2163-1", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q1/504", }, { name: "USN-2162-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2162-1", }, { name: "[oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q1/473", }, { name: "openSUSE-SU-2014:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html", }, { name: "http://bugs.gw.com/view.php?id=313", refsource: "CONFIRM", url: "http://bugs.gw.com/view.php?id=313", }, { name: "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q1/505", }, { name: "http://www.php.net/ChangeLog-5.php", refsource: "CONFIRM", url: "http://www.php.net/ChangeLog-5.php", }, { name: "openSUSE-SU-2014:0364", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", refsource: "CONFIRM", url: "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801", }, { name: "RHSA-2014:1765", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "GLSA-201503-08", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201503-08", }, { name: "openSUSE-SU-2014:0435", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html", }, { name: "DSA-2873", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2873", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2014-2270", datePublished: "2014-03-14T15:00:00", dateReserved: "2014-03-04T00:00:00", dateUpdated: "2024-08-06T10:06:00.288Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3487
Vulnerability from cvelistv5
Published
2014-07-09 10:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.php.net/bug.php?id=67413", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59831", }, { name: "68120", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/68120", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-12T00:00:00", descriptions: [ { lang: "en", value: "The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.php.net/bug.php?id=67413", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59831", }, { name: "68120", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/68120", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3487", datePublished: "2014-07-09T10:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.287Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-9620
Vulnerability from cvelistv5
Published
2015-01-21 18:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/17/9 | mailing-list, x_refsource_MLIST | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3686-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://rhn.redhat.com/errata/RHSA-2016-0760.html | vendor-advisory, x_refsource_REDHAT | |
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4 | x_refsource_CONFIRM | |
http://mx.gw.com/pipermail/file/2015/001660.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/71715 | vdb-entry, x_refsource_BID | |
http://mx.gw.com/pipermail/file/2014/001653.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3121 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201503-08 | vendor-advisory, x_refsource_GENTOO | |
http://advisories.mageia.org/MGASA-2015-0040.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:47:41.963Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", }, { name: "[File] 20150102 file 5.22 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "71715", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71715", }, { name: "[File] 20141216 file 5.21 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001653.html", }, { name: "DSA-3121", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3121", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-08", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-16T00:00:00", descriptions: [ { lang: "en", value: "The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-15T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", }, { name: "[File] 20150102 file 5.22 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "71715", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71715", }, { name: "[File] 20141216 file 5.21 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001653.html", }, { name: "DSA-3121", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3121", }, { name: "GLSA-201503-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201503-08", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9620", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20150117 Re: CVE request: file(1) DoS", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/01/17/9", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3686-1/", }, { name: "RHSA-2016:0760", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", refsource: "CONFIRM", url: "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", }, { name: "[File] 20150102 file 5.22 is now available", refsource: "MLIST", url: "http://mx.gw.com/pipermail/file/2015/001660.html", }, { name: "71715", refsource: "BID", url: "http://www.securityfocus.com/bid/71715", }, { name: "[File] 20141216 file 5.21 is now available", refsource: "MLIST", url: "http://mx.gw.com/pipermail/file/2014/001653.html", }, { name: "DSA-3121", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3121", }, { name: "GLSA-201503-08", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201503-08", }, { name: "http://advisories.mageia.org/MGASA-2015-0040.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9620", datePublished: "2015-01-21T18:00:00", dateReserved: "2015-01-17T00:00:00", dateUpdated: "2024-08-06T13:47:41.963Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-9653
Vulnerability from cvelistv5
Published
2015-03-30 10:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:47:41.805Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2015/02/05/13", }, { name: "DSA-3196", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3196", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://php.net/ChangeLog-5.php", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "[file] 20141216 [PATCH] readelf.c: better checks for values returned by pread", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001649.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gw.com/view.php?id=409", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", }, { name: "72516", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/72516", }, { name: "GLSA-201701-42", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-42", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-02-05T00:00:00", descriptions: [ { lang: "en", value: "readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-06-15T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3686-1/", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2015/02/05/13", }, { name: "DSA-3196", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3196", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://php.net/ChangeLog-5.php", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "[file] 20141216 [PATCH] readelf.c: better checks for values returned by pread", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001649.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gw.com/view.php?id=409", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", }, { name: "72516", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/72516", }, { name: "GLSA-201701-42", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-42", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9653", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "USN-3686-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3686-1/", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2015/02/05/13", }, { name: "DSA-3196", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3196", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2016:0760", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "http://php.net/ChangeLog-5.php", refsource: "CONFIRM", url: "http://php.net/ChangeLog-5.php", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "[file] 20141216 [PATCH] readelf.c: better checks for values returned by pread", refsource: "MLIST", url: "http://mx.gw.com/pipermail/file/2014/001649.html", }, { name: "http://bugs.gw.com/view.php?id=409", refsource: "CONFIRM", url: "http://bugs.gw.com/view.php?id=409", }, { name: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", refsource: "CONFIRM", url: "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", }, { name: "72516", refsource: "BID", url: "http://www.securityfocus.com/bid/72516", }, { name: "GLSA-201701-42", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-42", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9653", datePublished: "2015-03-30T10:00:00", dateReserved: "2015-02-05T00:00:00", dateUpdated: "2024-08-06T13:47:41.805Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3480
Vulnerability from cvelistv5
Published
2014-07-09 10:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.355Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { name: "68238", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/68238", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.php.net/bug.php?id=67412", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59831", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-12T00:00:00", descriptions: [ { lang: "en", value: "The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { name: "68238", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/68238", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.php.net/bug.php?id=67412", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59831", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3480", datePublished: "2014-07-09T10:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.355Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-1000249
Vulnerability from cvelistv5
Published
2017-09-11 19:00
Modified
2024-08-05 22:00
Severity ?
EPSS score ?
Summary
An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
References
▼ | URL | Tags |
---|---|---|
https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793 | x_refsource_CONFIRM | |
https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d | x_refsource_CONFIRM | |
http://www.debian.org/security/2017/dsa-3965 | vendor-advisory, x_refsource_DEBIAN | |
https://security.gentoo.org/glsa/201710-02 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:00:40.818Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", }, { name: "DSA-3965", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3965", }, { name: "GLSA-201710-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201710-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], dateAssigned: "2017-09-01T00:00:00", datePublic: "2017-09-05T00:00:00", descriptions: [ { lang: "en", value: "An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-07T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", }, { name: "DSA-3965", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3965", }, { name: "GLSA-201710-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201710-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", DATE_ASSIGNED: "2017-09-01", ID: "CVE-2017-1000249", REQUESTER: "thomas.jarosch@intra2net.com", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", refsource: "CONFIRM", url: "https://github.com/file/file/commit/35c94dc6acc418f1ad7f6241a6680e5327495793", }, { name: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", refsource: "CONFIRM", url: "https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d", }, { name: "DSA-3965", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3965", }, { name: "GLSA-201710-02", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201710-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-1000249", datePublished: "2017-09-11T19:00:00", dateReserved: "2017-09-11T00:00:00", dateUpdated: "2024-08-05T22:00:40.818Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-48554
Vulnerability from cvelistv5
Published
2023-08-22 00:00
Modified
2024-08-03 15:17
Severity ?
EPSS score ?
Summary
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:17:55.372Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://bugs.astron.com/view.php?id=310", }, { name: "DSA-5489", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5489", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20231116-0002/", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214081", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214088", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214084", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214086", }, { name: "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Mar/21", }, { name: "20240313 APPLE-SA-03-07-2024-6 tvOS 17.4", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Mar/25", }, { name: "20240313 APPLE-SA-03-07-2024-5 watchOS 10.4", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Mar/24", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \"File\" is the name of an Open Source project.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-03-13T22:07:17.737915", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://bugs.astron.com/view.php?id=310", }, { name: "DSA-5489", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5489", }, { url: "https://security.netapp.com/advisory/ntap-20231116-0002/", }, { url: "https://support.apple.com/kb/HT214081", }, { url: "https://support.apple.com/kb/HT214088", }, { url: "https://support.apple.com/kb/HT214084", }, { url: "https://support.apple.com/kb/HT214086", }, { name: "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2024/Mar/21", }, { name: "20240313 APPLE-SA-03-07-2024-6 tvOS 17.4", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2024/Mar/25", }, { name: "20240313 APPLE-SA-03-07-2024-5 watchOS 10.4", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2024/Mar/24", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-48554", datePublished: "2023-08-22T00:00:00", dateReserved: "2023-07-23T00:00:00", dateUpdated: "2024-08-03T15:17:55.372Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-9652
Vulnerability from cvelistv5
Published
2015-03-30 10:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:47:41.726Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "72505", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/72505", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2015:0440", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://php.net/ChangeLog-5.php", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "SUSE-SU-2015:0436", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", }, { name: "SUSE-SU-2015:0424", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", }, { name: "RHSA-2015:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1135.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gw.com/view.php?id=398", }, { name: "GLSA-201701-42", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-42", }, { name: "RHSA-2015:1053", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1053.html", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2015/02/05/12", }, { name: "RHSA-2015:1066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1066.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.php.net/bug.php?id=68735", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-02-05T00:00:00", descriptions: [ { lang: "en", value: "The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "72505", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/72505", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2015:0440", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://php.net/ChangeLog-5.php", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205267", }, { name: "SUSE-SU-2015:0436", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", }, { name: "SUSE-SU-2015:0424", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", }, { name: "RHSA-2015:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1135.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gw.com/view.php?id=398", }, { name: "GLSA-201701-42", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-42", }, { name: "RHSA-2015:1053", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1053.html", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2015/02/05/12", }, { name: "RHSA-2015:1066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1066.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.php.net/bug.php?id=68735", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9652", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "72505", refsource: "BID", url: "http://www.securityfocus.com/bid/72505", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2015:0440", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", }, { name: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", refsource: "CONFIRM", url: "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", }, { name: "http://php.net/ChangeLog-5.php", refsource: "CONFIRM", url: "http://php.net/ChangeLog-5.php", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "SUSE-SU-2015:0436", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", }, { name: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", refsource: "CONFIRM", url: "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", }, { name: "SUSE-SU-2015:0424", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", }, { name: "RHSA-2015:1135", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1135.html", }, { name: "http://bugs.gw.com/view.php?id=398", refsource: "CONFIRM", url: "http://bugs.gw.com/view.php?id=398", }, { name: "GLSA-201701-42", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-42", }, { name: "RHSA-2015:1053", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1053.html", }, { name: "[oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2015/02/05/12", }, { name: "RHSA-2015:1066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1066.html", }, { name: "https://bugs.php.net/bug.php?id=68735", refsource: "CONFIRM", url: "https://bugs.php.net/bug.php?id=68735", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9652", datePublished: "2015-03-30T10:00:00", dateReserved: "2015-02-05T00:00:00", dateUpdated: "2024-08-06T13:47:41.726Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-8904
Vulnerability from cvelistv5
Published
2019-02-18 17:00
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.
References
▼ | URL | Tags |
---|---|---|
https://bugs.astron.com/view.php?id=62 | x_refsource_MISC | |
http://www.securityfocus.com/bid/107130 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3911-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T21:31:37.501Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.astron.com/view.php?id=62", }, { name: "107130", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107130", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3911-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-02-18T00:00:00", descriptions: [ { lang: "en", value: "do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-25T16:06:09", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugs.astron.com/view.php?id=62", }, { name: "107130", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107130", }, { name: "USN-3911-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3911-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-8904", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.astron.com/view.php?id=62", refsource: "MISC", url: "https://bugs.astron.com/view.php?id=62", }, { name: "107130", refsource: "BID", url: "http://www.securityfocus.com/bid/107130", }, { name: "USN-3911-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3911-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-8904", datePublished: "2019-02-18T17:00:00", dateReserved: "2019-02-18T00:00:00", dateUpdated: "2024-08-04T21:31:37.501Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-10360
Vulnerability from cvelistv5
Published
2018-06-11 10:00
Modified
2024-08-05 07:39
Severity ?
EPSS score ?
Summary
The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3686-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3686-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.gentoo.org/glsa/201806-08 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:39:07.370Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3686-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", }, { name: "USN-3686-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3686-2/", }, { name: "GLSA-201806-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201806-08", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-06-11T00:00:00", descriptions: [ { lang: "en", value: "The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-12T11:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-3686-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3686-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", }, { name: "USN-3686-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3686-2/", }, { name: "GLSA-201806-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201806-08", }, { name: "openSUSE-SU-2019:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "openSUSE-SU-2019:1197", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-10360", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3686-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3686-1/", }, { name: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", refsource: "CONFIRM", url: "https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22", }, { name: "USN-3686-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3686-2/", }, { name: "GLSA-201806-08", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201806-08", }, { name: "openSUSE-SU-2019:0345", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html", }, { name: "openSUSE-SU-2019:1197", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-10360", datePublished: "2018-06-11T10:00:00", dateReserved: "2018-04-24T00:00:00", dateUpdated: "2024-08-05T07:39:07.370Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-8116
Vulnerability from cvelistv5
Published
2014-12-17 19:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:10:51.049Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", }, { name: "61944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61944", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "71700", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71700", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", }, { name: "USN-2494-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "1031344", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-10T00:00:00", descriptions: [ { lang: "en", value: "The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", }, { name: "61944", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61944", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "71700", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71700", }, { name: "RHSA-2016:0760", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", }, { name: "USN-2494-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2494-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "1031344", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2014/q4/1056", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-8116", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", refsource: "CONFIRM", url: "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", }, { name: "61944", refsource: "SECUNIA", url: "http://secunia.com/advisories/61944", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "FreeBSD-SA-14:28", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", }, { name: "71700", refsource: "BID", url: "http://www.securityfocus.com/bid/71700", }, { name: "RHSA-2016:0760", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0760.html", }, { name: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", refsource: "CONFIRM", url: "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", }, { name: "USN-2494-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2494-1", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "1031344", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031344", }, { name: "62081", refsource: "SECUNIA", url: "http://secunia.com/advisories/62081", }, { name: "[oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117", refsource: "MLIST", url: "http://seclists.org/oss-sec/2014/q4/1056", }, { name: "http://advisories.mageia.org/MGASA-2015-0040.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2015-0040.html", }, { name: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", refsource: "CONFIRM", url: "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-8116", datePublished: "2014-12-17T19:00:00", dateReserved: "2014-10-10T00:00:00", dateUpdated: "2024-08-06T13:10:51.049Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3479
Vulnerability from cvelistv5
Published
2014-07-09 10:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.212Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.php.net/bug.php?id=67411", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { name: "68241", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/68241", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59831", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-12T00:00:00", descriptions: [ { lang: "en", value: "The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67", }, { name: "RHSA-2014:1766", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1766.html", }, { name: "DSA-3021", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3021", }, { name: "HPSBUX03102", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "DSA-2974", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2974", }, { name: "59794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59794", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/ChangeLog-5.php", }, { name: "[file] 20140612 file-5.19 is now available", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mx.gw.com/pipermail/file/2014/001553.html", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2014:1765", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1765.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.php.net/bug.php?id=67411", }, { name: "SSRT101681", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141017844705317&w=2", }, { name: "68241", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/68241", }, { name: "59831", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59831", }, { name: "openSUSE-SU-2014:1236", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3479", datePublished: "2014-07-09T10:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.212Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }