gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
CPE | Name | Operator | Version |
---|---|---|---|
php | eq | 5.5.0 alpha1 | |
php | eq | 5.5.0 alpha3 | |
php | eq | 5.4.12 rc1 | |
php | eq | 5.4.15 rc1 | |
php | eq | 5.5.0 beta3 | |
php | eq | 5.4.12 | |
php | eq | 5.5.0 | |
php | eq | 5.4.19 | |
php | eq | 5.4.15 | |
php | eq | 5.5.1 |
lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
lists.opensuse.org/opensuse-updates/2014-09/msg00024.html
php.net/ChangeLog-5.php
rhn.redhat.com/errata/RHSA-2014-1327.html
rhn.redhat.com/errata/RHSA-2014-1765.html
rhn.redhat.com/errata/RHSA-2014-1766.html
www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
bugs.php.net/bug.php?id=67730
support.apple.com/HT204659