CVE Vulnerabilities

CVE-2014-3480

Published: Jul 09, 2014 | Modified: Dec 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.

Affected Software

NameVendorStart VersionEnd Version
FileFile_project*5.19 (excluding)
PhpPhp*5.3.29 (excluding)
PhpPhp5.4.0 (including)5.4.30 (excluding)
PhpPhp5.5.0 (including)5.5.14 (excluding)
Red Hat Enterprise Linux 5RedHatphp53-0:5.3.3-23.el5_10*
Red Hat Enterprise Linux 6RedHatphp-0:5.3.3-27.el6_5.1*
Red Hat Enterprise Linux 6RedHatfile-0:5.04-21.el6*
Red Hat Enterprise Linux 7RedHatphp-0:5.4.16-23.el7_0*
Red Hat Enterprise Linux 7RedHatfile-0:5.11-31.el7*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6RedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6RedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUSRedHatphp54-php-0:5.4.16-22.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUSRedHatphp55-php-0:5.5.6-13.el6*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7RedHatphp54-php-0:5.4.16-22.el7*
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7RedHatphp55-php-0:5.5.6-13.el7*
FileUbuntudevel*
FileUbuntuesm-infra-legacy/trusty*
FileUbuntulucid*
FileUbuntuprecise*
FileUbuntusaucy*
FileUbuntutrusty*
FileUbuntutrusty/esm*
FileUbuntuupstream*
Php5Ubuntudevel*
Php5Ubuntuesm-infra-legacy/trusty*
Php5Ubuntulucid*
Php5Ubuntuprecise*
Php5Ubuntusaucy*
Php5Ubuntutrusty*
Php5Ubuntutrusty/esm*
Php5Ubuntuupstream*

References