CVE-2014-3478

6.5 MEDIUM
Published: July 09, 2014 Modified: December 04, 2025

Description

Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/59794
Source: secalert@redhat.com
http://secunia.com/advisories/59831
Source: secalert@redhat.com
http://support.apple.com/kb/HT6443
Source: secalert@redhat.com
http://www.php.net/ChangeLog-5.php
Source: secalert@redhat.com
http://www.securityfocus.com/bid/68239
Source: secalert@redhat.com
https://bugs.php.net/bug.php?id=67410
Source: secalert@redhat.com
Patch
https://support.apple.com/HT204659
Source: secalert@redhat.com
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=141017844705317&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://mx.gw.com/pipermail/file/2014/001553.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2014-1327.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2014-1765.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2014-1766.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59794
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59831
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT6443
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2014/dsa-2974
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2014/dsa-3021
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.php.net/ChangeLog-5.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/68239
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugs.php.net/bug.php?id=67410
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
https://support.apple.com/HT204659
Source: af854a3a-2127-422b-91ae-364da2661108

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
25.3%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

christos_zoulas php