### [CVE-2015-8865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. ### POC #### Reference - https://hackerone.com/reports/476179 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/fokypoky/places-list - https://github.com/jeffhuang4704/vulasset