FKIE_CVE-2015-0232

Vulnerability from fkie_nvd - Published: 2015-01-27 20:04 - Updated: 2025-04-12 10:46
Severity ?
Summary
The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0040.html
secalert@redhat.comhttp://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a
secalert@redhat.comhttp://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df
secalert@redhat.comhttp://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143748090628601&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=144050155601375&w=2
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1053.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1066.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1135.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1218.html
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3195
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:032
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
secalert@redhat.comhttp://www.php.net/ChangeLog-5.php
secalert@redhat.comhttp://www.securityfocus.com/bid/72541
secalert@redhat.comhttps://bugs.php.net/bug.php?id=68799Exploit, Patch, Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1185472Patch
secalert@redhat.comhttps://security.gentoo.org/glsa/201503-03
secalert@redhat.comhttps://support.apple.com/HT205267
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0040.html
af854a3a-2127-422b-91ae-364da2661108http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a
af854a3a-2127-422b-91ae-364da2661108http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df
af854a3a-2127-422b-91ae-364da2661108http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143748090628601&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144050155601375&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1053.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1066.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1135.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1218.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3195
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:032
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/ChangeLog-5.php
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/72541
af854a3a-2127-422b-91ae-364da2661108https://bugs.php.net/bug.php?id=68799Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1185472Patch
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201503-03
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT205267
Impacted products
Vendor Product Version
php php *
php php 5.4.0
php php 5.4.1
php php 5.4.2
php php 5.4.3
php php 5.4.4
php php 5.4.5
php php 5.4.6
php php 5.4.7
php php 5.4.8
php php 5.4.9
php php 5.4.10
php php 5.4.11
php php 5.4.12
php php 5.4.12
php php 5.4.12
php php 5.4.13
php php 5.4.13
php php 5.4.14
php php 5.4.14
php php 5.4.15
php php 5.4.16
php php 5.4.17
php php 5.4.18
php php 5.4.19
php php 5.4.20
php php 5.4.21
php php 5.4.22
php php 5.4.23
php php 5.4.24
php php 5.4.25
php php 5.4.26
php php 5.4.27
php php 5.4.28
php php 5.4.29
php php 5.4.30
php php 5.4.34
php php 5.4.35
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.0
php php 5.5.1
php php 5.5.2
php php 5.5.3
php php 5.5.4
php php 5.5.5
php php 5.5.6
php php 5.5.7
php php 5.5.8
php php 5.5.9
php php 5.5.10
php php 5.5.11
php php 5.5.12
php php 5.5.13
php php 5.5.14
php php 5.5.15
php php 5.5.16
php php 5.5.17
php php 5.5.18
php php 5.5.19
php php 5.5.20
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.0
php php 5.6.1
php php 5.6.2
php php 5.6.3
php php 5.6.4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "732F5864-E1EA-497E-A3B9-768138BE237A",
              "versionEndIncluding": "5.4.36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7B9B8D2-78B7-4B17-955B-741C7A6F6634",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA2A940-BD69-4D35-AF12-432CB929248B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BD13F9-86C8-44C4-A860-9A87870A518E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B361FDE-9F6A-4E9A-96F1-619DC56EECB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBD9E7B-1237-47A8-8A07-5CC5246A9C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2BB41E-2096-4291-B0ED-06825FDFE8BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BA94F7-1AF9-415C-AC21-30BC25C74C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A739A0-698A-422B-886B-430A79F6E945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "086E0D24-A43E-4CEA-9FB0-FE193B88CC31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8D0963-8CA5-4814-9B6D-4E1C3907737B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A4B7E0-C872-4E53-AD72-1BB2755E4FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECCD553-53D5-485E-8C21-E2A5070833B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "95357C79-A754-4E0C-B65B-0FA241962B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "25EAF9A9-F7A1-4AC7-BCFD-769BE0FDB537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "74EA8037-7C22-48B3-9FA2-4BFFFFD513D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D1254E-0C72-4958-BA7F-5B818C3ACB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "92994FFC-F362-48AC-9CA8-8EBCAC880C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21131DF1-1EE5-4C84-B1E0-FA75BC39B344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0B23F85D-465B-4176-9798-E78AADE421EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "ADEE52B4-8392-4321-8C00-FABA6270E728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "57D74F58-DB3A-4A70-93CF-B350DB65EF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAEE86A0-C3FC-446E-8DF0-4FA32F741E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "90B670B6-A211-40C6-A8A0-1B0188EF891F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAAC4776-F3FF-42D8-AC6E-4746987D30BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "41DC16B7-7A45-4BDE-B340-F17D97CA3BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD7C2E6-9B34-4890-A0D1-39BB8ECA47E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8F72EC-7431-4B36-89EF-E7593ACFBFEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E9AC84-430D-4FDA-8FFE-B77E17803A11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "5238A7AE-D3FD-4465-95D7-F9C8787F9463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B877725-43E7-479E-9FA3-6D2FFE89B620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB33BBC0-9D17-4369-A52D-B4B65150380A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E112B5-12CC-40D5-AA1E-B5FB1ABC831E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "B078B1E5-14BD-4004-8384-4656E1063EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "27BB02F3-99A1-428C-A3C9-614B1277C88D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42873F3E-55BA-4CF3-BA13-13E49E59C363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8F6ABB-9F55-435A-B249-6449970F5DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.4.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "E840B9E2-0B9E-4BA7-B635-022DB695632F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6D9B19-E64D-4BED-9194-17460CE19E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "3D25E591-448C-4E3B-8557-6E48F7571796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "3AF783C9-26E7-4E02-BD41-77B9783667E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "7AEDF6F7-001D-4A35-A26F-417991AD377F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "4031DB99-B4B4-41EC-B3C1-543D92C575A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D5450EA7-A398-49D2-AA8E-7C95B074BAB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "BB8E09D8-9CBE-4279-88B7-24A214A5A537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "2D41ECCE-887D-49A2-9BB3-B559495AC55B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "79B418BC-27F4-4443-A0F7-FF4ADA568C1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F644EA6C-50C6-4A1C-A4AC-287AA9477B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD47F30-74F5-48E8-8657-C2373FE2BD22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C09527B-6B47-41F8-BDE6-01C47E452286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E454D87-23CB-4D7F-90FE-942EE54D661F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "130E50C1-D209-4CFF-9399-69D561340FBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F29948-9417-460B-8B04-D91AE4E8B423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37D00C1-4F41-4400-9CE4-8E8BAA3E4142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "093D08B7-CC3C-4616-8697-F15B253A7D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9CD8FEE-DE7B-47CB-9985-4092BFA071D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A30B2D9E-F289-43C9-BFBC-1CEF284A417E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE41CFDF-8ECD-41C1-94A7-5AFD42C5DDEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEAC9BA-AF82-4345-839C-D339DCB962A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFE682F-52E3-48EC-A993-F522FC29712F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "840EE3AC-5293-4F33-9E2C-96A0A2534B02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0FC407-96DB-425E-BB57-7A5BA839C37F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3839C81-3DAB-4E1D-9D95-BEFFD491F43D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC63A449-5D92-4F5F-8186-B58FFFBA54FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18236F6-2065-4A6A-93E7-FD90E650C689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEFBA84A-A4E4-438B-B9B5-8549809DCECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "5BF4E8FF-A3EC-43E8-A0C1-FD38AFCB77B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "54ADECFC-3C07-43BC-B296-6C25AC7F1C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "FE192054-2FBB-4388-A52A-422E20DEA2D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "F0195D48-3B42-4AC0-B9C5-436E01C63879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "BF0E5D67-ABC1-41A5-94E1-7DD3CDB51D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "319E0573-B1AD-40B6-B4BC-8BE67ED3EFDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "1A7C00EB-87B7-4EB7-A4AC-8665D8C78467",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "21BFCF10-786A-4D1E-9C37-50A1EC6056F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "95A6D6C8-5F46-4897-A0B0-778631E8CE6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F13E2D-A8F7-4B74-8D03-7905C81672C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE18933A-5FE6-41C7-B1B6-DA3E762C3FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE1289F-03A6-4621-B387-5F5ADAC4AE92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "383697F5-D29E-475A-84F3-46B54A928889",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n exif_process_unicode en ext/exif/exif.c en PHP anterior a 5.4.37, 5.5.x anterior a 5.5.21, y 5.6.x anterior a 5.6.5 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (liberaci\u00f3n de puntero no inicializado y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de datos EXIF manipulados en una imagen JPEG."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/824.html\"\u003eCWE-824: Access of Uninitialized Pointer\u003c/a\u003e",
  "id": "CVE-2015-0232",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-01-27T20:04:11.307",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2015-0040.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2015/dsa-3195"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/72541"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugs.php.net/bug.php?id=68799"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185472"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201503-03"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.apple.com/HT205267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2015-0040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/72541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugs.php.net/bug.php?id=68799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201503-03"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/HT205267"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…