CVE-2015-8865
Summary
| CVE | CVE-2015-8865 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-05-20 10:59:00 UTC |
| Updated | 2023-11-07 02:28:00 UTC |
| Description | The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Operating System |
Apple |
Mac Os X |
All |
All |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha1 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha2 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha3 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha4 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha5 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta1 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta2 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta3 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta4 |
All |
All |
| Application |
Php |
Php |
5.6.1 |
All |
All |
All |
| Application |
Php |
Php |
5.6.10 |
All |
All |
All |
| Application |
Php |
Php |
5.6.11 |
All |
All |
All |
| Application |
Php |
Php |
5.6.12 |
All |
All |
All |
| Application |
Php |
Php |
5.6.13 |
All |
All |
All |
| Application |
Php |
Php |
5.6.14 |
All |
All |
All |
| Application |
Php |
Php |
5.6.15 |
All |
All |
All |
| Application |
Php |
Php |
5.6.16 |
All |
All |
All |
| Application |
Php |
Php |
5.6.17 |
All |
All |
All |
| Application |
Php |
Php |
5.6.18 |
All |
All |
All |
| Application |
Php |
Php |
5.6.19 |
All |
All |
All |
| Application |
Php |
Php |
5.6.2 |
All |
All |
All |
| Application |
Php |
Php |
5.6.3 |
All |
All |
All |
| Application |
Php |
Php |
5.6.4 |
All |
All |
All |
| Application |
Php |
Php |
5.6.5 |
All |
All |
All |
| Application |
Php |
Php |
5.6.6 |
All |
All |
All |
| Application |
Php |
Php |
5.6.7 |
All |
All |
All |
| Application |
Php |
Php |
5.6.8 |
All |
All |
All |
| Application |
Php |
Php |
5.6.9 |
All |
All |
All |
| Application |
Php |
Php |
7.0.0 |
All |
All |
All |
| Application |
Php |
Php |
7.0.1 |
All |
All |
All |
| Application |
Php |
Php |
7.0.2 |
All |
All |
All |
| Application |
Php |
Php |
7.0.3 |
All |
All |
All |
| Application |
Php |
Php |
7.0.4 |
All |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha1 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha2 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha3 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha4 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
alpha5 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta1 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta2 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta3 |
All |
All |
| Application |
Php |
Php |
5.6.0 |
beta4 |
All |
All |
| Application |
Php |
Php |
5.6.1 |
All |
All |
All |
| Application |
Php |
Php |
5.6.10 |
All |
All |
All |
| Application |
Php |
Php |
5.6.11 |
All |
All |
All |
| Application |
Php |
Php |
5.6.12 |
All |
All |
All |
| Application |
Php |
Php |
5.6.13 |
All |
All |
All |
| Application |
Php |
Php |
5.6.14 |
All |
All |
All |
| Application |
Php |
Php |
5.6.15 |
All |
All |
All |
| Application |
Php |
Php |
5.6.16 |
All |
All |
All |
| Application |
Php |
Php |
5.6.17 |
All |
All |
All |
| Application |
Php |
Php |
5.6.18 |
All |
All |
All |
| Application |
Php |
Php |
5.6.19 |
All |
All |
All |
| Application |
Php |
Php |
5.6.2 |
All |
All |
All |
| Application |
Php |
Php |
5.6.3 |
All |
All |
All |
| Application |
Php |
Php |
5.6.4 |
All |
All |
All |
| Application |
Php |
Php |
5.6.5 |
All |
All |
All |
| Application |
Php |
Php |
5.6.6 |
All |
All |
All |
| Application |
Php |
Php |
5.6.7 |
All |
All |
All |
| Application |
Php |
Php |
5.6.8 |
All |
All |
All |
| Application |
Php |
Php |
5.6.9 |
All |
All |
All |
| Application |
Php |
Php |
7.0.0 |
All |
All |
All |
| Application |
Php |
Php |
7.0.1 |
All |
All |
All |
| Application |
Php |
Php |
7.0.2 |
All |
All |
All |
| Application |
Php |
Php |
7.0.3 |
All |
All |
All |
| Application |
Php |
Php |
7.0.4 |
All |
All |
All |
| Application |
Php |
Php |
All |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| About the security content of OS X El Capitan v10.11.5 and Security Update 2016-003 - Apple Support |
CONFIRM |
support.apple.com |
|
| APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003 |
APPLE |
lists.apple.com |
|
| 208.43.231.11 Git - php-src.git/commit |
|
git.php.net |
|
| USN-2952-2: PHP regression | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| USN-3686-2: file vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
|
| Document Display | HPE Support Center |
CONFIRM |
h20566.www2.hpe.com |
|
| file: Multiple vulnerabilities (GLSA 201701-42) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| USN-3686-1: file vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| bugs.gw.com/view.php |
CONFIRM |
bugs.gw.com |
|
| PHP :: Sec Bug #71527 :: Buffer over-write in finfo_open with malformed magic file. |
CONFIRM |
bugs.php.net |
Exploit |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
|
| 208.43.231.11 Git - php-src.git/commit |
CONFIRM |
git.php.net |
|
| oss-security - Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases |
MLIST |
www.openwall.com |
|
| USN-2952-1: PHP vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| Debian -- Security Information -- DSA-3560-1 php5 |
DEBIAN |
www.debian.org |
|
| PR/454: Fix memory corruption when the continuation level jumps by mo… · file/file@6713ca4 · GitHub |
CONFIRM |
github.com |
|
| PHP: PHP 7 ChangeLog |
CONFIRM |
www.php.net |
|
| PHP: PHP 5 ChangeLog |
CONFIRM |
www.php.net |
|
| PHP: Multiple vulnerabilities (GLSA 201611-22) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| [security-announce] openSUSE-SU-2016:1167-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| PHP 'finfo_open()' Function Denial of Service Vulnerability |
BID |
www.securityfocus.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710357 Gentoo Linux file Multiple Vulnerabilities (GLSA 201701-42)