SB2016011915 - Multiple vulnerabilities in PHP
Published: January 19, 2016 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2016-1904)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in ext/standard/exec.c in PHP 7.x before 7.0.2 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a long string to the (1) php_escape_shell_cmd or (2) php_escape_shell_arg function, leading to a heap-based buffer overflow.
2) Buffer overflow (CVE-ID: CVE-2016-1903)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
3) Format string error (CVE-ID: CVE-2015-8617)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2016/01/14/8
- http://www.php.net/ChangeLog-7.php
- http://www.securitytracker.com/id/1034608
- https://bugs.php.net/bug.php?id=71270
- https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/79916
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
- http://www.ubuntu.com/usn/USN-2952-1
- http://www.ubuntu.com/usn/USN-2952-2
- https://bugs.php.net/bug.php?id=70976
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://php.net/ChangeLog-7.php
- http://www.securitytracker.com/id/1034543
- https://bugs.php.net/bug.php?id=71105
- https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e