Description
The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
Published: 2016-05-20
Score: 7.3 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-460-1 file security update
Debian DLA Debian DLA DLA-499-1 php5 security update
Debian DSA Debian DSA DSA-3560-1 php5 security update
EUVD EUVD EUVD-2015-8721 The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
Ubuntu USN Ubuntu USN USN-2984-1 PHP vulnerabilities
Ubuntu USN Ubuntu USN USN-3686-1 file vulnerabilities
Ubuntu USN Ubuntu USN USN-3686-2 file vulnerabilities
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04485}

epss

{'score': 0.06088}


Subscriptions

Apple Mac Os X
Php Php
Redhat Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:29:22.084Z

Reserved: 2016-04-23T00:00:00.000Z

Link: CVE-2015-8865

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-05-20T10:59:00.137

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-8865

cve-icon Redhat

Severity : Low

Publid Date: 2016-02-23T00:00:00Z

Links: CVE-2015-8865 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses