Improper Input Validation Affecting file-libs package, versions <0:5.19-1.18.amzn1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-FILELIBS-1676154
- published 27 Sep 2021
- disclosed 9 Jul 2014
How to fix?
Upgrade Amazon-Linux:2018.03
file-libs
to version 0:5.19-1.18.amzn1 or higher.
This issue was patched in ALAS-2014-382
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream file-libs
package and not the file-libs
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2018.03
relevant fixed versions and status.
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
References
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://www.securityfocus.com/bid/68120
- https://bugs.php.net/bug.php?id=67413
- https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
- https://support.apple.com/HT204659
- http://support.apple.com/kb/HT6443
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
- http://www.debian.org/security/2014/dsa-2974
- http://www.debian.org/security/2014/dsa-3021
- http://marc.info/?l=bugtraq&m=141017844705317&w=2
- http://mx.gw.com/pipermail/file/2014/001553.html
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://secunia.com/advisories/59794
- http://secunia.com/advisories/59831
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html