CVE-2014-1943
file: unrestricted recursion in handling of indirect type rules
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
Fine Free File anterior a 5.17 permite a atacantes dependientes de contexto causar una denegación de servicio (recursión infinita, consumo de CPU y caída) a través de un valor manipulado de desplazamiento indirecto en el "magic" de un archivo.
A denial of service flaw was found in the way the File Information (fileinfo) extension handled indirect rules. A remote attacker could use this flaw to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU.
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. PHP's fileinfo module provides functions used to identify a particular file according to the type of data contained by the file. Multiple denial of service flaws were found in the way the File Information extension parsed certain Composite Document Format files. A remote attacker could use either of these flaws to crash a PHP application using fileinfo via a specially crafted CDF file. Two denial of service flaws were found in the way the File Information extension handled indirect and search rules. A remote attacker could use either of these flaws to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-02-10 CVE Reserved
- 2014-02-18 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-755: Improper Handling of Exceptional Conditions
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://mx.gw.com/pipermail/file/2014/001327.html | Broken Link | |
http://mx.gw.com/pipermail/file/2014/001330.html | Broken Link | |
http://mx.gw.com/pipermail/file/2014/001334.html | Broken Link | |
http://mx.gw.com/pipermail/file/2014/001337.html | Broken Link | |
http://support.apple.com/kb/HT6443 | Third Party Advisory |
|
https://github.com/glensc/file/blob/FILE5_17/ChangeLog | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html | 2022-10-31 | |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html | 2022-10-31 | |
http://rhn.redhat.com/errata/RHSA-2014-1765.html | 2022-10-31 | |
http://www.debian.org/security/2014/dsa-2861 | 2022-10-31 | |
http://www.debian.org/security/2014/dsa-2868 | 2022-10-31 | |
http://www.php.net/ChangeLog-5.php | 2022-10-31 | |
http://www.ubuntu.com/usn/USN-2123-1 | 2022-10-31 | |
http://www.ubuntu.com/usn/USN-2126-1 | 2022-10-31 | |
https://access.redhat.com/security/cve/CVE-2014-1943 | 2014-10-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1065836 | 2014-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fine Free File Project Search vendor "Fine Free File Project" | Fine Free File Search vendor "Fine Free File Project" for product "Fine Free File" | < 5.17 Search vendor "Fine Free File Project" for product "Fine Free File" and version " < 5.17" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.4.0 < 5.4.26 Search vendor "Php" for product "Php" and version " >= 5.4.0 < 5.4.26" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.5.0 < 5.5.10 Search vendor "Php" for product "Php" and version " >= 5.5.0 < 5.5.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 13.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "13.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
|