Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2014-3538: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2014-3538: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
07/03/2014
Created
07/25/2018
Added
12/09/2016
Modified
06/07/2020

Description

file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.

Solution(s)

  • suse-upgrade-apache2-mod_php7
  • suse-upgrade-php7
  • suse-upgrade-php7-ctype
  • suse-upgrade-php7-devel
  • suse-upgrade-php7-dom
  • suse-upgrade-php7-iconv
  • suse-upgrade-php7-json
  • suse-upgrade-php7-mysql
  • suse-upgrade-php7-pdo
  • suse-upgrade-php7-pgsql
  • suse-upgrade-php7-sqlite
  • suse-upgrade-php7-tokenizer
  • suse-upgrade-php7-xmlreader
  • suse-upgrade-php7-xmlwriter
  • suse-upgrade-php72-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;