CVE-2014-9652

NameCVE-2014-9652
DescriptionThe mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-145-1, DSA-3121-1, DSA-3126-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
file (PTS)jessie, jessie (lts)1:5.22+15-2+deb8u7fixed
stretch (security), stretch (lts), stretch1:5.30-1+deb9u3fixed
buster1:5.35-4+deb10u2fixed
buster (security), buster (lts)1:5.35-4+deb10u1fixed
bullseye (security), bullseye1:5.39-3+deb11u1fixed
bookworm1:5.44-3fixed
sid, trixie1:5.45-3fixed
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
filesourcesqueeze(not affected)
filesourcewheezy5.11-2+deb7u7
filesource(unstable)1:5.21+15-1
php5sourcesqueeze5.3.3-7+squeeze24DLA-145-1
php5sourcewheezy5.4.36-0+deb7u3
php5source(unstable)5.6.5+dfsg-1

Notes

[squeeze] - file <not-affected> (The code was not vulnerable, confirmed with Valgrind on the test data submitted to upstream)
http://bugs.gw.com/view.php?id=398
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
https://bugs.php.net/bug.php?id=68735

Search for package or bug name: Reporting problems