{"api_version":"1","generated_at":"2026-04-23T11:33:29+00:00","cve":"CVE-2014-3710","urls":{"html":"https://cve.report/CVE-2014-3710","api":"https://cve.report/api/cve/CVE-2014-3710.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-3710","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-3710"},"summary":{"title":"CVE-2014-3710","description":"The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2014-11-05 11:55:00","updated_at":"2023-11-07 02:20:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","refsource":"CONFIRM","tags":[],"title":"Oracle Bulletin Board Update - January 2015","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1765.html","name":"RHSA-2014:1765","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0","name":"https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0","refsource":"CONFIRM","tags":[],"title":"Fix note bounds reading, Francisco Alonso / Red Hat · file/file@39c7ac1 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1767.html","name":"RHSA-2014:1767","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc","name":"FreeBSD-SA-14:28","refsource":"FREEBSD","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html","name":"RHSA-2016:0760","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00113.html","name":"openSUSE-SU-2014:1516","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2014:1516-1: moderate: Security update for file","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/61970","name":"61970","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA61970 - Oracle Linux update for php53 - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2494-1","name":"USN-2494-1","refsource":"UBUNTU","tags":[],"title":"USN-2494-1: file vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201701-42","name":"GLSA-201701-42","refsource":"GENTOO","tags":[],"title":"file: Multiple vulnerabilities (GLSA 201701-42) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60630","name":"60630","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA60630 - Red Hat update for php53 - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201503-03","name":"GLSA-201503-03","refsource":"GENTOO","tags":[],"title":"PHP: Multiple vulnerabilities (GLSA 201503-03) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html","name":"APPLE-SA-2015-04-08-2","refsource":"APPLE","tags":[],"title":"APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","refsource":"CONFIRM","tags":[],"title":"Oracle Linux Bulletin - April 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1155071","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1155071","refsource":"CONFIRM","tags":[],"title":"Bug 1155071 – CVE-2014-3710 file: out-of-bounds read in elf note headers","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=1803228597e82218a8c105e67975bc50e6f5bf0d","name":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=1803228597e82218a8c105e67975bc50e6f5bf0d","refsource":"","tags":[],"title":"208.43.231.11 Git - php-src.git/commit","mime":"text/xml","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"CONFIRM","tags":[],"title":"Oracle Solaris Third Party Bulletin - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1767.html","name":"http://linux.oracle.com/errata/ELSA-2014-1767.html","refsource":"CONFIRM","tags":[],"title":"linux.oracle.com | ELSA-2014-1767","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61982","name":"61982","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA61982 - Oracle Linux update for php - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62559","name":"62559","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA62559 - Debian update for php5 - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1768.html","name":"http://linux.oracle.com/errata/ELSA-2014-1768.html","refsource":"CONFIRM","tags":[],"title":"linux.oracle.com | ELSA-2014-1768","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","refsource":"CONFIRM","tags":[],"title":"Oracle Linux Bulletin - October 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031344","name":"1031344","refsource":"SECTRACK","tags":[],"title":"FreeBSD file(1) and libmagic(3) File Processing Flaws Let Remote Users Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61763","name":"61763","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA61763 - Ubuntu update for php5 - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2014/dsa-3072","name":"DSA-3072","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3072-1 file","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.php.net/bug.php?id=68283","name":"https://bugs.php.net/bug.php?id=68283","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"PHP :: Sec Bug #68283 :: fileinfo: out-of-bounds read in elf note headers","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2391-1","name":"USN-2391-1","refsource":"UBUNTU","tags":[],"title":"USN-2391-1: php5 vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1768.html","name":"RHSA-2014:1768","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/62347","name":"62347","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA62347 - Debian update for file - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1766.html","name":"RHSA-2014:1766","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://git.php.net/?p=php-src.git;a=commit;h=1803228597e82218a8c105e67975bc50e6f5bf0d","name":"http://git.php.net/?p=php-src.git;a=commit;h=1803228597e82218a8c105e67975bc50e6f5bf0d","refsource":"CONFIRM","tags":[],"title":"208.43.231.11 Git - php-src.git/commit","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT204659","name":"https://support.apple.com/HT204659","refsource":"CONFIRM","tags":[],"title":"About the security content of OS X Yosemite v10.10.3 and Security Update 2015-004 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60699","name":"60699","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA60699 - Red Hat update for php - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/70807","name":"70807","refsource":"BID","tags":[],"title":"PHP 'donote()' Function Out-of-Bounds Read Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-3710","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3710","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"10.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"5.4.34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3710","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"5.4.34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-3710","qid":"710357","title":"Gentoo Linux file Multiple Vulnerabilities (GLSA 201701-42)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2014-3710","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://bugs.php.net/bug.php?id=68283","refsource":"CONFIRM","url":"https://bugs.php.net/bug.php?id=68283"},{"name":"http://git.php.net/?p=php-src.git;a=commit;h=1803228597e82218a8c105e67975bc50e6f5bf0d","refsource":"CONFIRM","url":"http://git.php.net/?p=php-src.git;a=commit;h=1803228597e82218a8c105e67975bc50e6f5bf0d"},{"name":"62347","refsource":"SECUNIA","url":"http://secunia.com/advisories/62347"},{"name":"RHSA-2014:1767","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-1767.html"},{"name":"USN-2391-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2391-1"},{"name":"https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0","refsource":"CONFIRM","url":"https://github.com/file/file/commit/39c7ac1106be844a5296d3eb5971946cc09ffda0"},{"name":"https://support.apple.com/HT204659","refsource":"CONFIRM","url":"https://support.apple.com/HT204659"},{"name":"61982","refsource":"SECUNIA","url":"http://secunia.com/advisories/61982"},{"name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"name":"61763","refsource":"SECUNIA","url":"http://secunia.com/advisories/61763"},{"name":"http://linux.oracle.com/errata/ELSA-2014-1767.html","refsource":"CONFIRM","url":"http://linux.oracle.com/errata/ELSA-2014-1767.html"},{"name":"RHSA-2014:1766","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-1766.html"},{"name":"FreeBSD-SA-14:28","refsource":"FREEBSD","url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc"},{"name":"http://linux.oracle.com/errata/ELSA-2014-1768.html","refsource":"CONFIRM","url":"http://linux.oracle.com/errata/ELSA-2014-1768.html"},{"name":"DSA-3072","refsource":"DEBIAN","url":"http://www.debian.org/security/2014/dsa-3072"},{"name":"RHSA-2016:0760","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html"},{"name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"name":"USN-2494-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2494-1"},{"name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"name":"APPLE-SA-2015-04-08-2","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"},{"name":"61970","refsource":"SECUNIA","url":"http://secunia.com/advisories/61970"},{"name":"1031344","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1031344"},{"name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"name":"RHSA-2014:1765","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-1765.html"},{"name":"openSUSE-SU-2014:1516","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00113.html"},{"name":"RHSA-2014:1768","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-1768.html"},{"name":"GLSA-201701-42","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201701-42"},{"name":"60699","refsource":"SECUNIA","url":"http://secunia.com/advisories/60699"},{"name":"GLSA-201503-03","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201503-03"},{"name":"70807","refsource":"BID","url":"http://www.securityfocus.com/bid/70807"},{"name":"60630","refsource":"SECUNIA","url":"http://secunia.com/advisories/60630"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1155071","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1155071"},{"name":"62559","refsource":"SECUNIA","url":"http://secunia.com/advisories/62559"}]}},"nvd":{"publishedDate":"2014-11-05 11:55:00","lastModifiedDate":"2023-11-07 02:20:00","problem_types":["CWE-20"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6.0","versionEndExcluding":"5.6.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5.0","versionEndExcluding":"5.5.19","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.0","versionEndExcluding":"5.4.35","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"3710","Ordinal":"70663","Title":"CVE-2014-3710","CVE":"CVE-2014-3710","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"3710","Ordinal":"1","NoteData":"The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"3710","Ordinal":"2","NoteData":"2014-11-05","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"3710","Ordinal":"3","NoteData":"2018-01-04","Type":"Other","Title":"Modified"}]}}}