Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-4721 | First vendor Publication | 2014-07-06 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4721 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24837 | |||
Oval ID: | oval:org.mitre.oval:def:24837 | ||
Title: | DSA-2974-1 -- php5 - security update | ||
Description: | Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2974-1 CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-4721 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25226 | |||
Oval ID: | oval:org.mitre.oval:def:25226 | ||
Title: | USN-2276-1 -- php5 vulnerabilities | ||
Description: | Several security issues were fixed in PHP. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2276-1 CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-4670 CVE-2014-4698 CVE-2014-4721 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 13.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26421 | |||
Oval ID: | oval:org.mitre.oval:def:26421 | ||
Title: | RHSA-2014:1013: php security update (Moderate) | ||
Description: | PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. PHP's fileinfo module provides functions used to identify a particular file according to the type of data contained by the file. A denial of service flaw was found in the File Information (fileinfo) extension rules for detecting AWK files. A remote attacker could use this flaw to cause a PHP application using fileinfo to consume an excessive amount of CPU. (CVE-2013-7345) Multiple denial of service flaws were found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash a PHP application using fileinfo via a specially crafted CDF file. (CVE-2014-0207, CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487) A heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT records. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record() function to perform a DNS query. (CVE-2014-4049) A type confusion issue was found in PHP's phpinfo() function. A malicious script author could possibly use this flaw to disclose certain portions of server memory. (CVE-2014-4721) A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes' unserialize() method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3515) The CVE-2014-0207, CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, and CVE-2014-3487 issues were discovered by Francisco Alonso of Red Hat Product Security. All php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1013-00 CESA-2014:1013 CVE-2013-7345 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-4049 CVE-2014-4721 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | php |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-08-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1638-1.nasl - Type : ACT_GATHER_INFO |
2015-09-24 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17313.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-080.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-18.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140806_php53_and_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1013.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1012.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1013.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1012.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1013.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1012.nasl - Type : ACT_GATHER_INFO |
2014-08-01 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-471.nasl - Type : ACT_GATHER_INFO |
2014-07-31 | Name : The remote openSUSE host is missing a security update. File : suse_13_1_openSUSE-2014--140721.nasl - Type : ACT_GATHER_INFO |
2014-07-31 | Name : The remote openSUSE host is missing a security update. File : suse_12_3_openSUSE-2014--140721.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-140720.nasl - Type : ACT_GATHER_INFO |
2014-07-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2276-1.nasl - Type : ACT_GATHER_INFO |
2014-07-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-130.nasl - Type : ACT_GATHER_INFO |
2014-07-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2974.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote web server is running a version of PHP that is affected by multipl... File : php_5_4_30.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote web server is running a version of PHP that is affected by multipl... File : php_5_5_14.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:41:50 |
|
2024-08-02 12:29:09 |
|
2024-08-02 01:08:43 |
|
2024-02-02 01:28:18 |
|
2024-02-01 12:08:22 |
|
2023-09-05 12:26:50 |
|
2023-09-05 01:08:15 |
|
2023-09-02 12:26:50 |
|
2023-09-02 01:08:23 |
|
2023-08-12 12:29:13 |
|
2023-08-12 01:07:52 |
|
2023-08-11 12:24:57 |
|
2023-08-11 01:08:05 |
|
2023-08-06 12:24:15 |
|
2023-08-06 01:07:51 |
|
2023-08-04 12:24:18 |
|
2023-08-04 01:07:55 |
|
2023-07-14 12:24:17 |
|
2023-07-14 01:07:54 |
|
2023-03-29 01:26:07 |
|
2023-03-28 12:08:15 |
|
2023-01-19 21:27:55 |
|
2022-10-11 12:21:55 |
|
2022-10-11 01:08:03 |
|
2021-05-04 12:32:44 |
|
2021-04-22 01:40:03 |
|
2020-05-23 01:52:39 |
|
2020-05-23 00:41:39 |
|
2019-06-08 12:06:17 |
|
2018-10-03 12:04:19 |
|
2018-03-12 12:01:11 |
|
2017-01-07 09:25:40 |
|
2016-10-26 09:22:43 |
|
2016-10-05 01:01:43 |
|
2016-08-30 13:21:27 |
|
2016-06-29 00:37:45 |
|
2016-04-27 01:02:48 |
|
2015-09-25 13:23:54 |
|
2015-03-31 13:28:40 |
|
2015-03-27 13:28:25 |
|
2014-11-19 09:24:12 |
|
2014-11-14 13:28:32 |
|
2014-08-08 13:24:47 |
|
2014-08-07 13:25:17 |
|
2014-08-02 13:24:24 |
|
2014-08-01 13:25:17 |
|
2014-07-31 13:25:26 |
|
2014-07-18 09:23:54 |
|
2014-07-11 13:25:11 |
|
2014-07-10 13:25:11 |
|
2014-07-09 13:25:40 |
|
2014-07-07 21:24:13 |
|
2014-07-07 05:23:22 |
|