Out-of-Bounds Affecting file-libs package, versions <0:5.19-1.18.amzn1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-FILELIBS-1676144
- published 27 Sep 2021
- disclosed 1 Jun 2014
Introduced: 1 Jun 2014
CVE-2014-0238 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2018.03
file-libs
to version 0:5.19-1.18.amzn1 or higher.
This issue was patched in ALAS-2014-382
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream file-libs
package and not the file-libs
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2018.03
relevant fixed versions and status.
The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
References
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://www.securityfocus.com/bid/67765
- https://bugs.php.net/bug.php?id=67327
- https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0
- https://support.apple.com/HT204659
- http://support.apple.com/kb/HT6443
- http://www-01.ibm.com/support/docview.wss?uid=swg21683486
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
- http://www.debian.org/security/2014/dsa-3021
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://secunia.com/advisories/59061
- http://secunia.com/advisories/59329
- http://secunia.com/advisories/59418
- http://secunia.com/advisories/60998
- http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html