Name | CVE-2014-5120 |
Description | gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libgd2 (PTS) | bullseye | 2.3.0-2 | fixed |
bookworm | 2.3.3-9 | fixed | |
sid, trixie | 2.3.3-12 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libgd2 | source | (unstable) | (not affected) | |||
php5 | source | squeeze | (not affected) | |||
php5 | source | (unstable) | 5.4.0-1 |
[squeeze] - php5 <not-affected> (Introduced in 5.4)
- libgd2 <not-affected> (Specific to integration of gd in PHP)
https://bugs.php.net/bug.php?id=67730
https://bugs.php.net/patch-display.php?bug_id=67730&patch=gd-null-injection&revision=latest
For the PHP5 5.4 branch this issue is fixed in version 5.4.32
fixed in Debian with the gdIOCtx.patch patch