CVE-2014-3478

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2014-3478
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2014-3478.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-3478
Related
Published
2014-07-09T11:07:01Z
Modified
2024-09-11T02:00:07Z
Summary
[none]
Details

Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.

References

Affected packages

Debian:11 / file

Package

Name
file
Purl
pkg:deb/debian/file?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:5.19-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / file

Package

Name
file
Purl
pkg:deb/debian/file?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:5.19-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / file

Package

Name
file
Purl
pkg:deb/debian/file?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:5.19-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}