Show plain JSON{"id": "CVE-2014-4049", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-06-18T19:55:05.683", "references": [{"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00051.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00032.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59270", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59329", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59418", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59496", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59513", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59652", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/60998", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://support.apple.com/kb/HT6443", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2014/dsa-2961", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2014/06/13/4", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/68007", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id/1030435", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108447", "tags": ["Issue Tracking"], "source": "cve@mitre.org"}, {"url": "https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://support.apple.com/HT204659", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function."}, {"lang": "es", "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n php_parserr en ext/standard/dns.c en PHP 5.6.0beta4 y anteriores permite a servidores remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un registro DNS TXT manipulado, relacionado con la funci\u00f3n dns_get_record."}], "lastModified": "2022-08-29T20:05:23.073", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B61C8E39-DB8E-4636-91E5-2473B0915FBD", "versionEndExcluding": "5.3.29", "versionStartIncluding": "5.3.0"}, {"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD052020-AA37-4F49-A0FE-EA99616C12C7", "versionEndExcluding": "5.4.30", "versionStartIncluding": "5.4.0"}, {"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ADC6057-9D35-4D87-B15D-F6F52A283464", "versionEndExcluding": "5.5.14", "versionStartIncluding": "5.5.0"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF4E8FF-A3EC-43E8-A0C1-FD38AFCB77B8"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54ADECFC-3C07-43BC-B296-6C25AC7F1C95"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE192054-2FBB-4388-A52A-422E20DEA2D7"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0195D48-3B42-4AC0-B9C5-436E01C63879"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF0E5D67-ABC1-41A5-94E1-7DD3CDB51D81"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "319E0573-B1AD-40B6-B4BC-8BE67ED3EFDB"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A7C00EB-87B7-4EB7-A4AC-8665D8C78467"}, {"criteria": "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21BFCF10-786A-4D1E-9C37-50A1EC6056F1"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"}, {"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}