CVE-2014-5120

high

Description

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

References

https://support.apple.com/HT204659

https://bugs.php.net/bug.php?id=67730

http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

http://rhn.redhat.com/errata/RHSA-2014-1766.html

http://rhn.redhat.com/errata/RHSA-2014-1765.html

http://rhn.redhat.com/errata/RHSA-2014-1327.html

http://php.net/ChangeLog-5.php

http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html

http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html

Details

Source: Mitre, NVD

Published: 2014-08-23

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High