Vulnerability Name:

CVE-2014-9425 (CCN-99589)

Assigned:2014-12-30
Published:2014-12-30
Updated:2022-08-04
Summary:Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
CWE-416
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Third Party Advisory
http://advisories.mageia.org/MGASA-2015-0040.html

Source: MITRE
Type: CNA
CVE-2014-9425

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.php.net/?p=php-src.git;a=commit;h=24125f0f26f3787c006e4a51611ba33ee3b841cb

Source: CCN
Type: PHP GIT Repository
Fixed bug #68676 (Explicit Double Free)

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.php.net/?p=php-src.git;a=commit;h=2bcf69d073190e4f032d883f3416dea1b027a39e

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.php.net/?p=php-src.git;a=commit;h=fbf3a6bc1abcc8a5b5226b0ad9464c37f11ddbd6

Source: APPLE
Type: Mailing List, Third Party Advisory
APPLE-SA-2015-09-30-3

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20141229 Re: CVE Request: Double Free in PHP

Source: REDHAT
Type: Third Party Advisory
RHSA-2015:1218

Source: CCN
Type: oss-security Mailing List, Mon, 29 Dec 2014 11:36:50 -0500 (EST)
Re: CVE Request: Double Free in PHP

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Source: BID
Type: Third Party Advisory, VDB Entry
71800

Source: CCN
Type: BID-71800
PHP CVE-2014-9425 Double Free Denial of Service Vulnerability

Source: CCN
Type: PHP Bug #68676
Explicit Double Free

Source: CONFIRM
Type: Vendor Advisory
https://bugs.php.net/bug.php?id=68676

Source: XF
Type: UNKNOWN
php-zend-engine-code-exec(99589)

Source: GENTOO
Type: Third Party Advisory
GLSA-201503-03

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/HT205267

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.5.20)
  • OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 5.6.0 and <= 5.6.4)

  • Configuration 2:
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version <= 10.10.5)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.5.20:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.6.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.6.3:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20151218
    P
    RHSA-2015:1218: php security update (Moderate)
    2015-07-09
    oval:com.ubuntu.precise:def:20149425000
    V
    CVE-2014-9425 on Ubuntu 12.04 LTS (precise) - medium.
    2014-12-30
    oval:com.ubuntu.trusty:def:20149425000
    V
    CVE-2014-9425 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-12-30
    BACK
    php php *
    php php *
    apple mac os x *
    php php 5.5.20
    php php 5.6.0
    php php 5.6.1
    php php 5.6.2
    php php 5.6.3