Bug 1098193 (CVE-2014-0237)
Summary: | CVE-2014-0237 file: cdf_unpack_summary_info() excessive looping DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Francisco Alonso <falonso> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bressers, carnil, grocha, jkaluza, jkurik, jorton, jrusnack, mmaslano, oliver, osoukup, rcollet, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | php 5.4.29, php 5.5.13 | Doc Type: | Bug Fix |
Doc Text: |
A denial of service flaw was found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-27 11:55:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1080180, 1103568, 1103569, 1114520, 1114521, 1119563, 1119564, 1120503, 1120504, 1120981, 1149768, 1149774, 1238984, 1238985 | ||
Bug Blocks: | 1065838, 1101912, 1149858, 1210268 |
Description
Francisco Alonso
2014-05-15 13:06:42 UTC
PHP commit in 5.4.29 http://git.php.net/?p=php-src.git;a=commit;h=68ce2d0ea6da79b12a365e375e1c2ce882c77480 Public now: http://www.php.net/ChangeLog-5.php#5.5.13 Created php tracking bugs for this issue: Affects: fedora-all [bug 1103569] Created file tracking bugs for this issue: Affects: fedora-all [bug 1103568] Fixed in PHP 5.4.29 and 5.5.13. Doesn't this also affect php-5.3.3 as shipped in RHEL6 and php-5.1.6 as shipped in RHEL5, as well as php53-5.3.3 (EPEL5)? Are there separate bugs for RHEL? And... Do I understand this will also fix CVE-2014-0238 ? PHP 5.1 in Red Hat Enterprise Linux 5 does not include fileinfo extension and hence does not embed file/libmagic. Therefore, it is not affected. In PHP use case, this issue is mitigated by PHP's maximum execution time limit: http://www.php.net/manual/en/info.configuration.php#ini.max-execution-time http://www.php.net/manual/en/function.set-time-limit.php This issue is unrelated to CVE-2014-0238. php-5.5.13-3.fc20, php-phpunit-PHPUnit-MockObject-1.2.3-4.fc20, php-doctrine-orm-2.4.2-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. php-5.5.13-3.fc19, php-phpunit-PHPUnit-MockObject-1.2.3-4.fc19, php-doctrine-orm-2.4.2-2.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. file-5.19-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. Statement: This issue did not affect the php and the file packages as shipped with Red Hat Enterprise Linux 5. This issue affects the versions of file as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. IssueDescription: A denial of service flaw was found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 Via RHSA-2014:1012 https://rhn.redhat.com/errata/RHSA-2014-1012.html This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1013 https://rhn.redhat.com/errata/RHSA-2014-1013.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1606 https://rhn.redhat.com/errata/RHSA-2014-1606.html This issue has been addressed in the following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Via RHSA-2014:1766 https://rhn.redhat.com/errata/RHSA-2014-1766.html This issue has been addressed in the following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Via RHSA-2014:1765 https://rhn.redhat.com/errata/RHSA-2014-1765.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2155 https://rhn.redhat.com/errata/RHSA-2015-2155.html |