SB2016062404 - Multiple vulnerabilities in PHP
Published: June 24, 2016 Updated: June 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2016-4425)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Jansson 2.7 and earlier allows context-dependent attackers to cause a denial of service (deep recursion, stack consumption, and crash) via crafted JSON data.
2) Configuration (CVE-ID: CVE-2008-5844)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PHP 5.2.7 contains an incorrect change to the FILTER_UNSAFE_RAW functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct SQL injection attacks and unspecified other attacks.
3) Information disclosure (CVE-ID: CVE-2008-5498)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2008-5624)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=d6abebf08d8cb612251e80024037a04905c96471
- https://git.alpinelinux.org/aports/commit/?id=5eb59c61782264ce71c7c786482ce8c3985440d1
- https://git.alpinelinux.org/aports/commit/?id=6abc64ee32b1aee3812b0b154fbe4efa8dd63ba2
- https://git.alpinelinux.org/aports/commit/?id=36ab20a1ac9047916d193fc1aae1cf8be6b0ee23
- https://git.alpinelinux.org/aports/commit/?id=3773f978e43b84d7ca9be80a9c0a66dbc8e7f99d
- http://bugs.php.net/bug.php?id=42718
- http://bugs.php.net/bug.php?id=46759
- http://www.php.net/archive/2008.php#id2008-12-07-1
- http://www.php.net/archive/2008.php#id2008-12-08-1
- http://www.php.net/ChangeLog-5.php#5.2.8
- http://www.securityfocus.com/bid/32673
- http://www.securitytracker.com/id?1021393
- http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1360&r2=1.2027.2.547.2.1361&diff_format=u
- http://downloads.securityfocus.com/vulnerabilities/exploits/33002.php
- http://downloads.securityfocus.com/vulnerabilities/exploits/33002-2.php
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://osvdb.org/51031
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35306
- http://secunia.com/advisories/35650
- http://secunia.com/advisories/36701
- http://securitytracker.com/id?1021494
- http://support.apple.com/kb/HT3865
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
- http://www.php.net/releases/5_2_9.php
- http://www.redhat.com/support/errata/RHSA-2009-0350.html
- http://www.securityfocus.com/bid/33002
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47635
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9667
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
- http://osvdb.org/50483
- http://osvdb.org/52207
- http://secunia.com/advisories/35003
- http://securityreason.com/achievement_securityalert/59
- http://wiki.rpath.com/Advisories:rPSA-2009-0035
- http://www.debian.org/security/2009/dsa-1789
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
- http://www.php.net/ChangeLog-5.php#5.2.7
- http://www.securityfocus.com/archive/1/498985/100/0/threaded
- http://www.securityfocus.com/archive/1/501376/100/0/threaded
- http://www.securityfocus.com/bid/32688
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47318