#VU16103 Out-of-bounds read in file - CVE-2014-9652


Vulnerability identifier: #VU16103

Vulnerability risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2014-9652

CWE-ID: CWE-125

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
file
Universal components / Libraries / Libraries used by multiple products

Vendor: Ian F. Darwin

Description

The vulnerability allows a remote attacker to cause DoS condition.

The vulnerability exists due to the mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string. A remote attacker can cause out-of-bounds memory access and application crash via a crafted file.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

file: 5.00 - 5.20


External links
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability