Lucene search

K
f5F5F5:K15653
HistoryOct 02, 2014 - 12:00 a.m.

K15653 : Multiple PHP vulnerabilities

2014-10-0200:00:00
my.f5.com
26

10 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.048 Low

EPSS

Percentile

91.9%

Security Advisory Description

Description

Following are descriptions of various PHP gdImageCrop vulnerabilities:

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value.

Multiple integer signedness errors in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allow remote attackers to cause a denial of service (application crash) or obtain sensitive information via an imagecrop function call with a negative value for the (1) x or (2) y dimension.

Impact

None. F5 products are not affected by these vulnerabilities.

Status

F5 Product Development has assigned ID 481367 to these vulnerabilities, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerabilities, and for information about releases or hotfixes that address the vulnerabilities, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP AAM None 11.4.0 - 11.6.0
None
BIG-IP AFM None 11.3.0 - 11.6.0
None
BIG-IP Analytics None 11.0.0 - 11.6.0
None
BIG-IP APM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP ASM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP Edge Gateway
None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
BIG-IP GTM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP Link Controller None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP PEM None
11.3.0 - 11.6.0
None
BIG-IP PSM None 11.0.0 - 11.4.1
10.1.0 - 10.2.4
None
BIG-IP WebAccelerator None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
BIG-IP WOM None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
ARX None 6.0.0 - 6.4.0
None
Enterprise Manager None 3.0.0 - 3.1.1
2.1.0 - 2.3.0
None
FirePass None 7.0.0
6.0.0 - 6.1.0
None
BIG-IQ Cloud None
4.0.0 - 4.4.0
None
BIG-IQ Device None
4.2.0 - 4.4.0
None
BIG-IQ Security None
4.0.0 - 4.4.0
None

Recommended action

None

Supplemental Information

10 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.048 Low

EPSS

Percentile

91.9%