CVE-2014-2020
Published Feb 18, 2014
Last updated 11 years ago
Overview
- Description
- ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C95DB8-99A7-4318-AFB5-C9C9C77430AC", "versionEndIncluding": "5.5.8" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D25E591-448C-4E3B-8557-6E48F7571796" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF783C9-26E7-4E02-BD41-77B9783667E3" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AEDF6F7-001D-4A35-A26F-417991AD377F" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4031DB99-B4B4-41EC-B3C1-543D92C575A9" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5450EA7-A398-49D2-AA8E-7C95B074BAB1" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB8E09D8-9CBE-4279-88B7-24A214A5A537" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D41ECCE-887D-49A2-9BB3-B559495AC55B" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B418BC-27F4-4443-A0F7-FF4ADA568C1B" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8" }, { "criteria": "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F644EA6C-50C6-4A1C-A4AC-287AA9477B46" }, { "criteria": "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DD47F30-74F5-48E8-8657-C2373FE2BD22" }, { "criteria": "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C09527B-6B47-41F8-BDE6-01C47E452286" }, { "criteria": "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E454D87-23CB-4D7F-90FE-942EE54D661F" }, { "criteria": "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA" }, { "criteria": "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "130E50C1-D209-4CFF-9399-69D561340FBB" }, { "criteria": "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F29948-9417-460B-8B04-D91AE4E8B423" } ], "operator": "OR" } ] } ]