CVE-2014-4670
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2014
Last modified:
12/04/2025
Description
Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | 5.5.14 (including) | |
| cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
- http://rhn.redhat.com/errata/RHSA-2014-1326.html
- http://rhn.redhat.com/errata/RHSA-2014-1327.html
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://secunia.com/advisories/54553
- http://secunia.com/advisories/59831
- http://secunia.com/advisories/60696
- http://www-01.ibm.com/support/docview.wss?uid=swg21683486
- http://www.debian.org/security/2014/dsa-3008
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- https://bugs.php.net/bug.php?id=67538
- https://support.apple.com/HT204659
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
- http://rhn.redhat.com/errata/RHSA-2014-1326.html
- http://rhn.redhat.com/errata/RHSA-2014-1327.html
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://secunia.com/advisories/54553
- http://secunia.com/advisories/59831
- http://secunia.com/advisories/60696
- http://www-01.ibm.com/support/docview.wss?uid=swg21683486
- http://www.debian.org/security/2014/dsa-3008
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- https://bugs.php.net/bug.php?id=67538
- https://support.apple.com/HT204659



