CVE-2015-8865

Published: 31 December 2015

The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.

Priority

Low

CVSS 3 base score: 7.3

Status

Package Release Status
file
Launchpad, Ubuntu, Debian
Upstream
Released (1:5.24-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable

Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(1:5.25-2ubuntu1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:5.14-2ubuntu3.4)
Patches:
Upstream: https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
php5
Launchpad, Ubuntu, Debian
Upstream
Released (5.6.20+dfsg-1)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr)
Released (5.5.9+dfsg-1ubuntu4.16)
Patches:
Upstream: http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
php7.0
Launchpad, Ubuntu, Debian
Upstream
Released (7.0.5-1)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus)
Released (7.0.4-7ubuntu2.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
Upstream: https://git.php.net/?p=php-src.git;a=commit;h=5272184a1ed0c5c6144e80bed6fb1951601ec3bc