ASA-201611-19 log original external raw
[ASA-201611-19] php: multiple issues |
---|
Arch Linux Security Advisory ASA-201611-19
==========================================
Severity: High
Date : 2016-11-18
CVE-ID : CVE-2016-6911 CVE-2016-7478 CVE-2016-7568 CVE-2016-8670
CVE-2016-9138 CVE-2016-9933 CVE-2016-9934
Package : php
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-58
Summary
=======
The package php before version 7.0.13-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Resolution
==========
Upgrade to 7.0.13-1.
# pacman -Syu "php>=7.0.13-1"
The problems have been fixed upstream in version 7.0.13.
Workaround
==========
None.
Description
===========
- CVE-2016-6911 (denial of service)
A vulnerability was found in gd as used in php. The function
dynamicGetbuf() failed to check for out of bounds reads. An attacker
could create a crafted image that would lead to a crash or,
potentially, information disclosure.
- CVE-2016-7478 (denial of service)
Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x
before 7.0.13, allows remote attackers to cause a denial of service
(infinite loop) via a crafted Exception object in serialized data,
which refers to itself as the previous exception and causing
exception::__toString to never to terminate.
- CVE-2016-7568 (arbitrary code execution)
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in gd. A specially crafted image, when converted to webp, could
cause the application to crash or potentially execute arbitrary code.
- CVE-2016-8670 (arbitrary code execution)
A vulnerability was found in gd. Integer underflow in a calculation in
dynamicGetbuf() was incorrectly handled, leading in some circumstances
to an out of bounds write through a very large argument to memcpy(). An
attacker could create a crafted image that would lead to a crash or,
potentially, code execution.
- CVE-2016-9138 (arbitrary code execution)
PHP through 5.6.27 and 7.x through 7.0.12 mishandles property
modification during __wakeup processing while unserializing, which
allows remote attackers to cause a denial of service or possibly
execute arbitrary code via crafted serialized data, as demonstrated by
Exception::__toString with DateInterval::__wakeup.
- CVE-2016-9933 (denial of service)
Stack consumption vulnerability has been discovered in the
gdImageFillToBorder function in gd.c in the GD Graphics Library (aka
libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before
7.0.13, allows remote attackers to cause a denial of service
(segmentation violation) via a crafted imagefilltoborder call that
triggers use of a negative color value.
- CVE-2016-9934 (denial of service)
It has been discovered that ext/wddx/wddx.c in PHP before 5.6.28 and
7.x before 7.0.13 allows remote attackers to cause a denial of service
(NULL pointer dereference) via crafted serialized data in a wddxPacket
XML document, as demonstrated by a PDORow string.
Impact
======
A remote attacker is able to execute arbitrary code or crash the
application via various vectors.
References
==========
https://bugs.php.net/bug.php?id=73093
https://bugs.php.net/bug.php?id=73003
https://github.com/libgd/libgd/issues/308
http://seclists.org/oss-sec/2016/q3/639
https://bugs.php.net/bug.php?id=73280
http://www.openwall.com/lists/oss-security/2016/10/15/6
https://bugs.php.net/bug.php?id=73147
https://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://seclists.org/oss-sec/2016/q4/296
https://bugs.php.net/bug.php?id=72696
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
http://www.openwall.com/lists/oss-security/2016/12/12/2
https://bugs.php.net/bug.php?id=73331
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://security.archlinux.org/CVE-2016-6911
https://security.archlinux.org/CVE-2016-7478
https://security.archlinux.org/CVE-2016-7568
https://security.archlinux.org/CVE-2016-8670
https://security.archlinux.org/CVE-2016-9138
https://security.archlinux.org/CVE-2016-9933
https://security.archlinux.org/CVE-2016-9934
|