{ "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.php.net/bug.php?id=68618", "refsource": "CONFIRM", "url": "https://bugs.php.net/bug.php?id=68618" }, { "name": "MDVSA-2015:032", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032" }, { "name": "HPSBMU03409", "refsource": "HP", "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2" }, { "name": "SUSE-SU-2015:0365", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "[oss-security] 20150103 Re: CVE Request: PHP: out of bounds read crashes php-cgi", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/01/03/4" }, { "name": "HPSBMU03380", "refsource": "HP", "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "[oss-security] 20141231 Re: CVE Request: PHP: out of bounds read crashes php-cgi", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/12/31/6" }, { "name": "http://git.php.net/?p=php-src.git;a=commit;h=f9ad3086693fce680fbe246e4a45aa92edd2ac35", "refsource": "CONFIRM", "url": "http://git.php.net/?p=php-src.git;a=commit;h=f9ad3086693fce680fbe246e4a45aa92edd2ac35" }, { "name": "openSUSE-SU-2015:0325", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html" }, { "name": "71833", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71833" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "[oss-security] 20141231 Re: CVE Request: PHP: out of bounds read crashes php-cgi", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/01/01/1" }, { "name": "RHSA-2015:1053", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html" }, { "name": "GLSA-201503-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201503-03" }, { "name": "http://advisories.mageia.org/MGASA-2015-0040.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0040.html" }, { "name": "RHSA-2015:1066", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html" } ] } }