CVE Vulnerabilities

CVE-2014-2497

NULL Pointer Dereference

Published: Mar 21, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
2.6 LOW
AV:N/AC:H/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
PhpPhp*5.4.32 (excluding)
PhpPhp5.5.0 (including)5.5.16 (excluding)
Red Hat Enterprise Linux 5RedHatphp53-0:5.3.3-24.el5*
Red Hat Enterprise Linux 6RedHatphp-0:5.3.3-27.el6_5.2*
Red Hat Enterprise Linux 7RedHatphp-0:5.4.16-23.el7_0.1*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6RedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6RedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7RedHatphp54-php-0:5.4.16-22.el7*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7RedHatphp55-php-0:5.5.6-13.el7*
Libgd2Ubuntuesm-infra-legacy/trusty*
Libgd2Ubuntulucid*
Libgd2Ubuntuprecise*
Libgd2Ubuntuquantal*
Libgd2Ubuntusaucy*
Libgd2Ubuntutrusty*
Libgd2Ubuntutrusty/esm*
Libgd2Ubuntuupstream*
Libgd2Ubuntuutopic*

Potential Mitigations

References