Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-02647

Опубликовано: 03 янв. 2015
Источник: fstec
CVSS3: 7.3
CVSS2: 7.5
EPSS Низкий

Описание

Уязвимость компонента cgi (sapi/cgi/cgi_main.c) интерпретатора языка программирования PHP вызвана переполнением буфера.Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, раскрыть защищаемую информацию, оказать воздействие на целостность данных или вызвать отказ в обслуживании

Вендор

Canonical Ltd.
Novell Inc.
Сообщество свободного программного обеспечения
PHP Group

Наименование ПО

Ubuntu
OpenSUSE Leap
Debian GNU/Linux
PHP

Версия ПО

14.10 (Ubuntu)
12.04 (Ubuntu)
15.0 (OpenSUSE Leap)
14.04 ESM (Ubuntu)
7 (Debian GNU/Linux)
6 (Debian GNU/Linux)
до 5.4.36 (PHP)
от 5.5.0 до 5.5.20 (PHP)
от 5.6.0 до 5.6.4 (PHP)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Canonical Ltd. Ubuntu 14.10
Canonical Ltd. Ubuntu 12.04
Novell Inc. OpenSUSE Leap 15.0
Canonical Ltd. Ubuntu 14.04 ESM
Сообщество свободного программного обеспечения Debian GNU/Linux 7
Сообщество свободного программного обеспечения Debian GNU/Linux 6

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,3)

Возможные меры по устранению уязвимости

Использование рекомендаций
https://bugs.php.net/bug.php?id=68618
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2014-9427
Для Ubuntu:
https://ubuntu.com/security/CVE-2014-9427
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2014-9427

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 88%
0.04219
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.

redhat
больше 10 лет назад

sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.

nvd
больше 10 лет назад

sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.

debian
больше 10 лет назад

sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x ...

github
около 3 лет назад

sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.

EPSS

Процентиль: 88%
0.04219
Низкий

7.3 High

CVSS3

7.5 High

CVSS2