CVE-2014-3515

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
References
Link Resource
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=88223c5245e9b470e1e6362bfd96829562ffe6ab
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141017844705317&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141017844705317&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1766.html Third Party Advisory
http://secunia.com/advisories/59794 Third Party Advisory
http://secunia.com/advisories/59831 Third Party Advisory
http://secunia.com/advisories/60998 Third Party Advisory
http://support.apple.com/kb/HT6443 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683486 Third Party Advisory
http://www.debian.org/security/2014/dsa-2974 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html Third Party Advisory
http://www.php.net/ChangeLog-5.php Vendor Advisory
http://www.securityfocus.com/bid/68237 Third Party Advisory VDB Entry
https://bugs.php.net/bug.php?id=67492 Patch Vendor Advisory
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=88223c5245e9b470e1e6362bfd96829562ffe6ab
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141017844705317&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141017844705317&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1766.html Third Party Advisory
http://secunia.com/advisories/59794 Third Party Advisory
http://secunia.com/advisories/59831 Third Party Advisory
http://secunia.com/advisories/60998 Third Party Advisory
http://support.apple.com/kb/HT6443 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683486 Third Party Advisory
http://www.debian.org/security/2014/dsa-2974 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html Third Party Advisory
http://www.php.net/ChangeLog-5.php Vendor Advisory
http://www.securityfocus.com/bid/68237 Third Party Advisory VDB Entry
https://bugs.php.net/bug.php?id=67492 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-07-09 11:07

Updated : 2025-04-12 10:46


NVD link : CVE-2014-3515

Mitre link : CVE-2014-3515

CVE.ORG link : CVE-2014-3515


JSON object : View

Products Affected

php

  • php

debian

  • debian_linux