CVE-2014-3478 (GCVE-0-2014-3478)

Vulnerability from cvelistv5 – Published: 2014-07-09 10:00 – Updated: 2025-12-04 20:26
VLAI?
Summary
Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
CWE
  • n/a
Assigner
References
https://support.apple.com/HT204659 x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-1766.html vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2014/dsa-3021 vendor-advisoryx_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=141017844705317&w=2 vendor-advisoryx_refsource_HP
http://www.oracle.com/technetwork/topics/security… x_refsource_CONFIRM
http://www.debian.org/security/2014/dsa-2974 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/59794 third-party-advisoryx_refsource_SECUNIA
http://www.php.net/ChangeLog-5.php x_refsource_CONFIRM
http://mx.gw.com/pipermail/file/2014/001553.html mailing-listx_refsource_MLIST
https://github.com/file/file/commit/27a14bc7ba285… x_refsource_CONFIRM
http://www.securityfocus.com/bid/68239 vdb-entryx_refsource_BID
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://support.apple.com/kb/HT6443 x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-1327.html vendor-advisoryx_refsource_REDHAT
http://www.oracle.com/technetwork/topics/security… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-1765.html vendor-advisoryx_refsource_REDHAT
https://bugs.php.net/bug.php?id=67410 x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141017844705317&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/59831 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-0… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:06.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT204659"
          },
          {
            "name": "RHSA-2014:1766",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
          },
          {
            "name": "DSA-3021",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-3021"
          },
          {
            "name": "HPSBUX03102",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
          },
          {
            "name": "DSA-2974",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2974"
          },
          {
            "name": "59794",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59794"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.php.net/ChangeLog-5.php"
          },
          {
            "name": "[file] 20140612 file-5.19 is now available",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mx.gw.com/pipermail/file/2014/001553.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08"
          },
          {
            "name": "68239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68239"
          },
          {
            "name": "APPLE-SA-2015-04-08-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT6443"
          },
          {
            "name": "RHSA-2014:1327",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1327.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
          },
          {
            "name": "RHSA-2014:1765",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.php.net/bug.php?id=67410"
          },
          {
            "name": "SSRT101681",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2"
          },
          {
            "name": "59831",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59831"
          },
          {
            "name": "openSUSE-SU-2014:1236",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2014-3478",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T20:26:48.397424Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:26:53.242Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/HT204659"
        },
        {
          "name": "RHSA-2014:1766",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
        },
        {
          "name": "DSA-3021",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-3021"
        },
        {
          "name": "HPSBUX03102",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
        },
        {
          "name": "DSA-2974",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2974"
        },
        {
          "name": "59794",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59794"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.php.net/ChangeLog-5.php"
        },
        {
          "name": "[file] 20140612 file-5.19 is now available",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mx.gw.com/pipermail/file/2014/001553.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08"
        },
        {
          "name": "68239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68239"
        },
        {
          "name": "APPLE-SA-2015-04-08-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT6443"
        },
        {
          "name": "RHSA-2014:1327",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1327.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
        },
        {
          "name": "RHSA-2014:1765",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.php.net/bug.php?id=67410"
        },
        {
          "name": "SSRT101681",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2"
        },
        {
          "name": "59831",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59831"
        },
        {
          "name": "openSUSE-SU-2014:1236",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-3478",
    "datePublished": "2014-07-09T10:00:00.000Z",
    "dateReserved": "2014-05-14T00:00:00.000Z",
    "dateUpdated": "2025-12-04T20:26:53.242Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.18\", \"matchCriteriaId\": \"FCDEA321-FC13-42AE-9250-0C6055D9B280\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6FF256D-3DD4-41A8-B119-D20A493A6EA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1981126-D773-49B6-BD3D-F17BC37352CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EF31A2-E788-4111-8C46-DB6C8F8724C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1587EAB1-5322-4264-A7E5-D70DA68F6B80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC514A20-168F-4653-8BBA-D068ACA3D2E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE0F4E1A-EA88-4858-9431-E82B2D415FB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D0625D-452F-4CE1-9A5F-6439AB6DE981\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECBFF148-DEAA-4D7C-9CFC-556FEADAB619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C99F7C59-F1C5-4202-A86F-90173D0FCF62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AA7E7E-60C1-40BD-AD21-5FDD92485FD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4DBB2C-5C87-42C8-BA3D-FF852C467013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B513E684-36C2-45D7-A166-3B42018AB79C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BBA4D40-EE73-4F38-ABA6-3840A67F097F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A647100-18D6-4741-B147-BBA95215BF2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6A554A0-AA80-419E-AEBD-6E659300316C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91B2F536-84E5-44A6-B515-2BD68E9906B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3814C047-D9FF-44E6-94FE-29B3B0F9F53A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:christos_zoulas:file:5.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B56BEB99-306B-438A-81E4-212AF53D0719\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.4.29\", \"matchCriteriaId\": \"1055C4A6-94BE-40CB-BAB4-39C08F5A7F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7B9B8D2-78B7-4B17-955B-741C7A6F6634\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CA2A940-BD69-4D35-AF12-432CB929248B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29BD13F9-86C8-44C4-A860-9A87870A518E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B361FDE-9F6A-4E9A-96F1-619DC56EECB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DBD9E7B-1237-47A8-8A07-5CC5246A9C5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F2BB41E-2096-4291-B0ED-06825FDFE8BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52BA94F7-1AF9-415C-AC21-30BC25C74C5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0A739A0-698A-422B-886B-430A79F6E945\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"086E0D24-A43E-4CEA-9FB0-FE193B88CC31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC8D0963-8CA5-4814-9B6D-4E1C3907737B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77A4B7E0-C872-4E53-AD72-1BB2755E4FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EECCD553-53D5-485E-8C21-E2A5070833B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95357C79-A754-4E0C-B65B-0FA241962B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"25EAF9A9-F7A1-4AC7-BCFD-769BE0FDB537\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"74EA8037-7C22-48B3-9FA2-4BFFFFD513D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8D1254E-0C72-4958-BA7F-5B818C3ACB15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"92994FFC-F362-48AC-9CA8-8EBCAC880C91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21131DF1-1EE5-4C84-B1E0-FA75BC39B344\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B23F85D-465B-4176-9798-E78AADE421EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADEE52B4-8392-4321-8C00-FABA6270E728\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"57D74F58-DB3A-4A70-93CF-B350DB65EF49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAEE86A0-C3FC-446E-8DF0-4FA32F741E1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B670B6-A211-40C6-A8A0-1B0188EF891F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAAC4776-F3FF-42D8-AC6E-4746987D30BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41DC16B7-7A45-4BDE-B340-F17D97CA3BDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FD7C2E6-9B34-4890-A0D1-39BB8ECA47E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F8F72EC-7431-4B36-89EF-E7593ACFBFEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E9AC84-430D-4FDA-8FFE-B77E17803A11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5238A7AE-D3FD-4465-95D7-F9C8787F9463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B877725-43E7-479E-9FA3-6D2FFE89B620\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB33BBC0-9D17-4369-A52D-B4B65150380A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95E112B5-12CC-40D5-AA1E-B5FB1ABC831E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B078B1E5-14BD-4004-8384-4656E1063EC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F6D9B19-E64D-4BED-9194-17460CE19E6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D25E591-448C-4E3B-8557-6E48F7571796\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AF783C9-26E7-4E02-BD41-77B9783667E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AEDF6F7-001D-4A35-A26F-417991AD377F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*\", \"matchCriteriaId\": \"4031DB99-B4B4-41EC-B3C1-543D92C575A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5450EA7-A398-49D2-AA8E-7C95B074BAB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB8E09D8-9CBE-4279-88B7-24A214A5A537\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D41ECCE-887D-49A2-9BB3-B559495AC55B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B418BC-27F4-4443-A0F7-FF4ADA568C1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F644EA6C-50C6-4A1C-A4AC-287AA9477B46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DD47F30-74F5-48E8-8657-C2373FE2BD22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C09527B-6B47-41F8-BDE6-01C47E452286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E454D87-23CB-4D7F-90FE-942EE54D661F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"130E50C1-D209-4CFF-9399-69D561340FBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F29948-9417-460B-8B04-D91AE4E8B423\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A37D00C1-4F41-4400-9CE4-8E8BAA3E4142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"093D08B7-CC3C-4616-8697-F15B253A7D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9CD8FEE-DE7B-47CB-9985-4092BFA071D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A30B2D9E-F289-43C9-BFBC-1CEF284A417E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE41CFDF-8ECD-41C1-94A7-5AFD42C5DDEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AEAC9BA-AF82-4345-839C-D339DCB962A7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de buffer en la funci\\u00f3n mconvert en softmagic.c en file anterior a 5.19, utilizado en el componente Fileinfo en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (ca\\u00edda de aplicaci\\u00f3n) a trav\\u00e9s de una cadena Pascal manipulada en una conversi\\u00f3n FILE_PSTRING.\"}]",
      "id": "CVE-2014-3478",
      "lastModified": "2024-11-21T02:08:11.613",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-07-09T11:07:01.587",
      "references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://mx.gw.com/pipermail/file/2014/001553.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1327.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1765.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1766.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/59794\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/59831\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT6443\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2974\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-3021\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.php.net/ChangeLog-5.php\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/68239\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugs.php.net/bug.php?id=67410\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://support.apple.com/HT204659\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://mx.gw.com/pipermail/file/2014/001553.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1327.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1765.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1766.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59794\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59831\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT6443\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2974\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-3021\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.php.net/ChangeLog-5.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/68239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.php.net/bug.php?id=67410\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://support.apple.com/HT204659\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-3478\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-07-09T11:07:01.587\",\"lastModified\":\"2025-12-04T21:16:05.920\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en la funci\u00f3n mconvert en softmagic.c en file anterior a 5.19, utilizado en el componente Fileinfo en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una cadena Pascal manipulada en una conversi\u00f3n FILE_PSTRING.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.18\",\"matchCriteriaId\":\"FCDEA321-FC13-42AE-9250-0C6055D9B280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FF256D-3DD4-41A8-B119-D20A493A6EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1981126-D773-49B6-BD3D-F17BC37352CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EF31A2-E788-4111-8C46-DB6C8F8724C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1587EAB1-5322-4264-A7E5-D70DA68F6B80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC514A20-168F-4653-8BBA-D068ACA3D2E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE0F4E1A-EA88-4858-9431-E82B2D415FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D0625D-452F-4CE1-9A5F-6439AB6DE981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBFF148-DEAA-4D7C-9CFC-556FEADAB619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C99F7C59-F1C5-4202-A86F-90173D0FCF62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AA7E7E-60C1-40BD-AD21-5FDD92485FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4DBB2C-5C87-42C8-BA3D-FF852C467013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B513E684-36C2-45D7-A166-3B42018AB79C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBA4D40-EE73-4F38-ABA6-3840A67F097F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A647100-18D6-4741-B147-BBA95215BF2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A554A0-AA80-419E-AEBD-6E659300316C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B2F536-84E5-44A6-B515-2BD68E9906B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3814C047-D9FF-44E6-94FE-29B3B0F9F53A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:christos_zoulas:file:5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B56BEB99-306B-438A-81E4-212AF53D0719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.4.29\",\"matchCriteriaId\":\"1055C4A6-94BE-40CB-BAB4-39C08F5A7F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7B9B8D2-78B7-4B17-955B-741C7A6F6634\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA2A940-BD69-4D35-AF12-432CB929248B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BD13F9-86C8-44C4-A860-9A87870A518E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B361FDE-9F6A-4E9A-96F1-619DC56EECB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBD9E7B-1237-47A8-8A07-5CC5246A9C5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2BB41E-2096-4291-B0ED-06825FDFE8BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BA94F7-1AF9-415C-AC21-30BC25C74C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A739A0-698A-422B-886B-430A79F6E945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086E0D24-A43E-4CEA-9FB0-FE193B88CC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC8D0963-8CA5-4814-9B6D-4E1C3907737B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A4B7E0-C872-4E53-AD72-1BB2755E4FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECCD553-53D5-485E-8C21-E2A5070833B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95357C79-A754-4E0C-B65B-0FA241962B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25EAF9A9-F7A1-4AC7-BCFD-769BE0FDB537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EA8037-7C22-48B3-9FA2-4BFFFFD513D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D1254E-0C72-4958-BA7F-5B818C3ACB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"92994FFC-F362-48AC-9CA8-8EBCAC880C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21131DF1-1EE5-4C84-B1E0-FA75BC39B344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B23F85D-465B-4176-9798-E78AADE421EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEE52B4-8392-4321-8C00-FABA6270E728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D74F58-DB3A-4A70-93CF-B350DB65EF49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAEE86A0-C3FC-446E-8DF0-4FA32F741E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B670B6-A211-40C6-A8A0-1B0188EF891F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAAC4776-F3FF-42D8-AC6E-4746987D30BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DC16B7-7A45-4BDE-B340-F17D97CA3BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD7C2E6-9B34-4890-A0D1-39BB8ECA47E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8F72EC-7431-4B36-89EF-E7593ACFBFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E9AC84-430D-4FDA-8FFE-B77E17803A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5238A7AE-D3FD-4465-95D7-F9C8787F9463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B877725-43E7-479E-9FA3-6D2FFE89B620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB33BBC0-9D17-4369-A52D-B4B65150380A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E112B5-12CC-40D5-AA1E-B5FB1ABC831E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B078B1E5-14BD-4004-8384-4656E1063EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6D9B19-E64D-4BED-9194-17460CE19E6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D25E591-448C-4E3B-8557-6E48F7571796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AF783C9-26E7-4E02-BD41-77B9783667E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEDF6F7-001D-4A35-A26F-417991AD377F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"4031DB99-B4B4-41EC-B3C1-543D92C575A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5450EA7-A398-49D2-AA8E-7C95B074BAB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB8E09D8-9CBE-4279-88B7-24A214A5A537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D41ECCE-887D-49A2-9BB3-B559495AC55B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B418BC-27F4-4443-A0F7-FF4ADA568C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F644EA6C-50C6-4A1C-A4AC-287AA9477B46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD47F30-74F5-48E8-8657-C2373FE2BD22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C09527B-6B47-41F8-BDE6-01C47E452286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E454D87-23CB-4D7F-90FE-942EE54D661F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"130E50C1-D209-4CFF-9399-69D561340FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F29948-9417-460B-8B04-D91AE4E8B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A37D00C1-4F41-4400-9CE4-8E8BAA3E4142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093D08B7-CC3C-4616-8697-F15B253A7D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9CD8FEE-DE7B-47CB-9985-4092BFA071D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30B2D9E-F289-43C9-BFBC-1CEF284A417E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE41CFDF-8ECD-41C1-94A7-5AFD42C5DDEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAC9BA-AF82-4345-839C-D339DCB962A7\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://mx.gw.com/pipermail/file/2014/001553.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1327.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1765.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1766.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59831\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT6443\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2974\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3021\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.php.net/ChangeLog-5.php\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/68239\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.php.net/bug.php?id=67410\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://support.apple.com/HT204659\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://mx.gw.com/pipermail/file/2014/001553.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1327.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1765.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1766.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59831\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT6443\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2974\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.php.net/ChangeLog-5.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/68239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.php.net/bug.php?id=67410\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://support.apple.com/HT204659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/HT204659\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1766.html\", \"name\": \"RHSA-2014:1766\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-3021\", \"name\": \"DSA-3021\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"name\": \"HPSBUX03102\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2974\", \"name\": \"DSA-2974\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/59794\", \"name\": \"59794\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.php.net/ChangeLog-5.php\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://mx.gw.com/pipermail/file/2014/001553.html\", \"name\": \"[file] 20140612 file-5.19 is now available\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/68239\", \"name\": \"68239\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\", \"name\": \"APPLE-SA-2015-04-08-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\", \"x_transferred\"]}, {\"url\": \"http://support.apple.com/kb/HT6443\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1327.html\", \"name\": \"RHSA-2014:1327\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1765.html\", \"name\": \"RHSA-2014:1765\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugs.php.net/bug.php?id=67410\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"name\": \"SSRT101681\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/59831\", \"name\": \"59831\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\", \"name\": \"openSUSE-SU-2014:1236\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T10:43:06.121Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2014-3478\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-04T20:26:48.397424Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-04T20:26:33.379Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2014-06-12T00:00:00.000Z\", \"references\": [{\"url\": \"https://support.apple.com/HT204659\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1766.html\", \"name\": \"RHSA-2014:1766\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-3021\", \"name\": \"DSA-3021\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"name\": \"HPSBUX03102\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2974\", \"name\": \"DSA-2974\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"http://secunia.com/advisories/59794\", \"name\": \"59794\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.php.net/ChangeLog-5.php\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://mx.gw.com/pipermail/file/2014/001553.html\", \"name\": \"[file] 20140612 file-5.19 is now available\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/68239\", \"name\": \"68239\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\", \"name\": \"APPLE-SA-2015-04-08-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\"]}, {\"url\": \"http://support.apple.com/kb/HT6443\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1327.html\", \"name\": \"RHSA-2014:1327\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1765.html\", \"name\": \"RHSA-2014:1765\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugs.php.net/bug.php?id=67410\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141017844705317\u0026w=2\", \"name\": \"SSRT101681\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/59831\", \"name\": \"59831\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html\", \"name\": \"openSUSE-SU-2014:1236\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2016-11-25T19:57:01.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2014-3478\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-04T20:26:53.242Z\", \"dateReserved\": \"2014-05-14T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2014-07-09T10:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…