SB2016062404 - Multiple vulnerabilities in PHP



SB2016062404 - Multiple vulnerabilities in PHP

Published: June 24, 2016 Updated: June 11, 2025

Security Bulletin ID SB2016062404
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2016-4425)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Jansson 2.7 and earlier allows context-dependent attackers to cause a denial of service (deep recursion, stack consumption, and crash) via crafted JSON data.


2) Configuration (CVE-ID: CVE-2008-5844)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

PHP 5.2.7 contains an incorrect change to the FILTER_UNSAFE_RAW functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct SQL injection attacks and unspecified other attacks.


3) Information disclosure (CVE-ID: CVE-2008-5498)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2008-5624)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.


Remediation

Install update from vendor's website.

References