{"id":"MGASA-2014-0367","summary":"Updated php packages fix multiple security vulnerabilities","details":"Updated php packages fix security vulnerabilities:\n\nInteger overflow in the cdf_read_property_info function in cdf.c\nin file through 5.19, as used in the Fileinfo component in PHP\nbefore 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to\ncause a denial of service (application crash) via a crafted CDF\nfile. NOTE: this vulnerability exists because of an incomplete fix\nfor CVE-2012-1571 (CVE-2014-3587).\n\nMultiple buffer overflows in the php_parserr function in\next/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow\nremote DNS servers to cause a denial of service (application crash)\nor possibly execute arbitrary code via a crafted DNS record, related\nto the dns_get_record function and the dn_expand function. NOTE:\nthis issue exists because of an incomplete fix for CVE-2014-4049\n(CVE-2014-3597).\n\ngd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x\nbefore 5.5.16 does not ensure that pathnames lack \\%00 sequences,\nwhich might allow remote attackers to overwrite arbitrary files\nvia crafted input to an application that calls the (1) imagegd, (2)\nimagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp,\nor (7) imagewebp function (CVE-2014-5120).\n\nThe php packages have been updated to 5.4.32 for Mageia 3 and 5.5.16 for\nMageia 4, fixing these issues and several other bugs.\n\nNote that the CVE-2014-5120 issue is only relevant for the php-gd-bundled\npackage in Mageia 3.\n\nAlso, php-apc has been rebuilt against the updated php packages.\n","modified":"2026-01-31T16:49:59.700581Z","published":"2014-09-05T09:07:37Z","related":["CVE-2014-3587","CVE-2014-3597","CVE-2014-5120"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0367.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13964"},{"type":"REPORT","url":"http://php.net/ChangeLog-5.php#5.4.32"},{"type":"REPORT","url":"http://php.net/ChangeLog-5.php#5.5.16"},{"type":"REPORT","url":"http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2014%3A172/"}],"affected":[{"package":{"name":"php","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/php?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.32-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0367.json"}},{"package":{"name":"php-apc","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/php-apc?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.14-7.12.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0367.json"}},{"package":{"name":"php-gd-bundled","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/php-gd-bundled?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.32-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0367.json"}},{"package":{"name":"php","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/php?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.16-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0367.json"}},{"package":{"name":"php-apc","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/php-apc?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.15-4.7.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0367.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}