7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.937 High
EPSS
Percentile
99.1%
An integer overflow flaw in PHP’s unserialize() function was reported. If unserialize() were used on untrusted data, this issue could lead to a crash or potentially information disclosure (CVE-2014-3669). A heap corruption issue was reported in PHP’s exif_thumbnail() function. A specially-crafted JPEG image could cause the PHP interpreter to crash or, potentially, execute arbitrary code (CVE-2014-3670). If client-supplied input was passed to PHP’s cURL client as a URL to download, it could return local files from the server due to improper handling of null bytes (PHP#68089). PHP has been updated to version 5.4.34 for Mageia 3 and 5.5.18 for Mageia 4, which fix these issues and other bugs. Additionally, the suhosin PHP extension has been updated to version 0.9.36 and a bug in the php zip extension that could cause a crash on Mageia 4 has been fixed (mga#13820)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 3 | noarch | php | < 5.4.34-1 | php-5.4.34-1.mga3 |
Mageia | 3 | noarch | php-apc | < 3.1.14-7.13 | php-apc-3.1.14-7.13.mga3 |
Mageia | 3 | noarch | php-gd-bundled | < 5.4.34-1 | php-gd-bundled-5.4.34-1.mga3 |
Mageia | 3 | noarch | php-suhosin | < 0.9.36-1 | php-suhosin-0.9.36-1.mga3 |
Mageia | 4 | noarch | php | < 5.5.18-1.1 | php-5.5.18-1.1.mga4 |
Mageia | 4 | noarch | php-apc | < 3.1.15-4.8 | php-apc-3.1.15-4.8.mga4 |
Mageia | 4 | noarch | php-suhosin | < 0.9.36-1 | php-suhosin-0.9.36-1.mga4 |