SB2016011916 - Multiple vulnerabilities in PHP



SB2016011916 - Multiple vulnerabilities in PHP

Published: January 19, 2016 Updated: August 9, 2020

Security Bulletin ID SB2016011916
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2015-8616)

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

Use-after-free vulnerability in the Collator::sortWithSortKeys function in ext/intl/collator/collator_sort.c in PHP 7.x before 7.0.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging the relationships between a key buffer and a destroyed array. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>


2) Input validation error (CVE-ID: CVE-2015-6527)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.


Remediation

Install update from vendor's website.