CVE-2014-3669
Published: 29 October 2014
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
lucid |
Released
(5.3.2-1ubuntu4.28)
|
precise |
Released
(5.3.10-1ubuntu3.15)
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.5)
|
|
upstream |
Released
(5.4.34, 5.5.18, 5.6.1)
|
|
utopic |
Released
(5.5.12+dfsg-2ubuntu4.1)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=9aa90145239bae82d2af0a99fdae4ab27eb5f4f2 upstream: http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159 |