SB2022030233 - SUSE update for php7 



SB2022030233 - SUSE update for php7

Published: March 2, 2022

Security Bulletin ID SB2022030233
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2015-9253)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the php-fpm master process due to improper processing of crafted PHP scripts. A remote attacker can send a specially crafted PHP script, trigger the php-fpm master process to restart a child process and cause the php-fpm master process the php-fpm master process to consume all available CPU resources and excessive amounts of disk space that results in denial of service.

2) Improper input validation (CVE-ID: CVE-2017-8923)

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation in zend_string_extend() function in Zend/zend_string.h when leveraging a script's use of ".=" with a long. The application does not prevent changes to string objects that can result in a negative length. A remote attacker can pass an overly long string to script, which uses ".=" operand on the supplied data and trigger application crash.

3) Out-of-bounds write (CVE-ID: CVE-2021-21703)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in the way PHP handles shared memory access, when using PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users. A child process can access shared memory with the main process and write to it. As a result, it is possible to cause the root process to conduct invalid memory reads and writes with root privileges. A local user can trigger an out-of-bounds write error and execute arbitrary code on the system with root privileges.




4) Input validation error (CVE-ID: CVE-2021-21707)

The vulnerability allows a remote attacker to inject arbitrary XML code.

The vulnerability exists due to insufficient validation of user-supplied input within the simplexml_load_file() PHP function when processing NULL byte character (e.g. %00). A remote attacker can pass specially crafted URL to the application and bypass implemented security restrictions.


Remediation

Install update from vendor's website.