CVE-2014-2497

N/A Unknown
Published: March 21, 2014 Modified: May 06, 2026
View on NVD

Description

The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0288.html
Source: cve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1326.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1327.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1766.html
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/59061
Source: cve@mitre.org
Not Applicable
http://secunia.com/advisories/59418
Source: cve@mitre.org
Not Applicable
http://secunia.com/advisories/59496
Source: cve@mitre.org
Not Applicable
http://secunia.com/advisories/59652
Source: cve@mitre.org
Not Applicable
http://www.debian.org/security/2015/dsa-3215
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/66233
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2987-1
Source: cve@mitre.org
Third Party Advisory
https://bugs.php.net/bug.php?id=66901
Source: cve@mitre.org
Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1076676
Source: cve@mitre.org
Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201607-04
Source: cve@mitre.org
Third Party Advisory
https://support.apple.com/HT204659
Source: cve@mitre.org
Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0288.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1326.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1327.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1766.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/59061
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59418
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59496
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59652
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.debian.org/security/2015/dsa-3215
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:153
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/66233
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2987-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugs.php.net/bug.php?id=66901
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1076676
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201607-04
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/HT204659
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
12.1%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redhat php canonical debian suse oracle