Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9705

Опубликовано: 30 мар. 2015
Источник: debian
EPSS Средний

Описание

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.6.6+dfsg-1package

Примечания

  • https://bugs.php.net/bug.php?id=68552

  • http://svn.php.net/viewvc/pecl/enchant/trunk/enchant.c?r1=317600&r2=335803

  • https://www.openwall.com/lists/oss-security/2015/03/10/6

EPSS

Процентиль: 97%
0.37263
Средний

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

redhat
больше 10 лет назад

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

nvd
около 10 лет назад

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

github
около 3 лет назад

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

fstec
около 10 лет назад

Уязвимость интерпретатора PHP, позволяющая удалённому злоумышленнику вызвать отказ в обслуживании или оказать иное воздействие на систему

EPSS

Процентиль: 97%
0.37263
Средний