SB2015051510 - Fedora 21 update for php
Published: May 15, 2015 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2006-7243)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
PHP before 5.3.4 accepts the character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php .jpg at the end of the argument to the file_exists function.
2) Resource exhaustion (CVE-ID: CVE-2015-4024)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9. A remote attacker can trigger CPU consumption and cause the service to crash via crafted form data that triggers an improper order-of-growth outcome.
3) Information disclosure (CVE-ID: CVE-2015-4025)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a x00 character in certain situations. A remote attacker can bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink.
4) Integer overflow (CVE-ID: CVE-2015-4022)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9. A remote attacker can trigger heap-based buffer overflow via a long reply to a LIST command and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
5) Security restrictions bypass (CVE-ID: CVE-2015-4026)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to the pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a x00 character. A remote attacker can bypass intended extension restrictions and execute files with unexpected names via a crafted first argument.
6) Integer underflow (CVE-ID: CVE-2015-4021)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to the phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the character. A remote attacker can trigger integer underflow and memory corruption)via a crafted entry in a tar archive and cause the service to crash.
Remediation
Install update from vendor's website.