CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
98.4%
Debian Security Advisory DSA-2974-1 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
July 08, 2014 http://www.debian.org/security/faq
Package : php5
CVE ID : CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480
CVE-2014-3487 CVE-2014-3515 CVE-2014-4721
Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. The Common
Vulnerabilities and Exposures project identifies the following problems:
CVE-2014-0207
Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_read_short_sector() function.
CVE-2014-3478
Francisco Alonso of the Red Hat Security Response Team discovered a
flaw in the way the truncated pascal string size in the mconvert()
function is computed.
CVE-2014-3479
Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_check_stream_offset() function.
CVE-2014-3480
Francisco Alonso of the Red Hat Security Response Team reported an
insufficient boundary check in the cdf_count_chain() function.
CVE-2014-3487
Francisco Alonso of the Red Hat Security Response Team discovered an
incorrect boundary check in the cdf_read_property_info() funtion.
CVE-2014-3515
Stefan Esser discovered that the ArrayObject and the
SPLObjectStorage unserialize() handler do not verify the type of
unserialized data before using it. A remote attacker could use this
flaw to execute arbitrary code.
CVE-2014-4721
Stefan Esser discovered a type confusion issue affecting phpinfo(),
which might allow an attacker to obtain sensitive information from
process memory.
For the stable distribution (wheezy), these problems have been fixed in
version 5.4.4-14+deb7u12. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.
For the testing distribution (jessie), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.
We recommend that you upgrade your php5 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | s390x | php5-cgi | < 5.4.4-14+deb7u12 | php5-cgi_5.4.4-14+deb7u12_s390x.deb |
Debian | 7 | sparc | php5-recode | < 5.4.4-14+deb7u12 | php5-recode_5.4.4-14+deb7u12_sparc.deb |
Debian | 7 | kfreebsd-amd64 | python-magic | < 5.11-2+deb7u4 | python-magic_5.11-2+deb7u4_kfreebsd-amd64.deb |
Debian | 7 | armel | php5-sybase | < 5.4.4-14+deb7u12 | php5-sybase_5.4.4-14+deb7u12_armel.deb |
Debian | 7 | s390 | php5-tidy | < 5.4.4-14+deb7u12 | php5-tidy_5.4.4-14+deb7u12_s390.deb |
Debian | 7 | i386 | libapache2-mod-php5filter | < 5.4.4-14+deb7u12 | libapache2-mod-php5filter_5.4.4-14+deb7u12_i386.deb |
Debian | 7 | armel | php5-pspell | < 5.4.4-14+deb7u12 | php5-pspell_5.4.4-14+deb7u12_armel.deb |
Debian | 7 | mips | libphp5-embed | < 5.4.4-14+deb7u12 | libphp5-embed_5.4.4-14+deb7u12_mips.deb |
Debian | 6 | amd64 | php5-gmp | < 5.3.3-7+squeeze21 | php5-gmp_5.3.3-7+squeeze21_amd64.deb |
Debian | 7 | s390x | python-magic-dbg | < 5.11-2+deb7u4 | python-magic-dbg_5.11-2+deb7u4_s390x.deb |