Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:1638-1

Опубликовано: 21 июн. 2016
Источник: suse-cvrf

Описание

Security update for php53

This update for php53 to version 5.3.17 fixes the following issues:

These security issues were fixed:

  • CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
  • CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011).
  • CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012).
  • CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
  • CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162).
  • CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
  • CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP allowed remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation (bsc#980366).
  • CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375).
  • CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373).
  • CVE-2016-4540: The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829).
  • CVE-2016-4541: The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829.
  • CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in PHP did not properly construct spprintf arguments, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830).
  • CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP did not validate IFD sizes, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
  • CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP did not validate TIFF start data, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
  • CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP accepted a negative integer for the scale argument, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
  • CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP modified certain data structures without considering whether they are copies of the zero, one, or two global variable, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
  • CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in PHP allowed remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero (bsc#978828).
  • CVE-2016-4342: ext/phar/phar_object.c in PHP mishandles zero-length uncompressed data, which allowed remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive (bsc#977991).
  • CVE-2016-4346: Integer overflow in the str_pad function in ext/standard/string.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow (bsc#977994).
  • CVE-2016-4073: Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call (bsc#977003).
  • CVE-2015-8867: The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP incorrectly relied on the deprecated RAND_pseudo_bytes function, which made it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors (bsc#977005).
  • CVE-2016-4070: Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP allowed remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function (bsc#976997).
  • CVE-2015-8866: ext/libxml/libxml.c in PHP when PHP-FPM is used, did not isolate each thread from libxml_disable_entity_loader changes in other threads, which allowed remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161 (bsc#976996).
  • CVE-2015-8838: ext/mysqlnd/mysqlnd.c in PHP used a client SSL option to mean that SSL is optional, which allowed man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152 (bsc#973792).
  • CVE-2015-8835: The make_http_soap_request function in ext/soap/php_http.c in PHP did not properly retrieve keys, which allowed remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c (bsc#973351).
  • CVE-2016-3141: Use-after-free vulnerability in wddx.c in the WDDX extension in PHP allowed remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element (bsc#969821).
  • CVE-2016-3142: The phar_parse_zipfile function in zip.c in the PHAR extension in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location (bsc#971912).
  • CVE-2014-9767: Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP ext/zip/ext_zip.cpp in HHVM allowed remote attackers to create arbitrary empty directories via a crafted ZIP archive (bsc#971612).
  • CVE-2016-3185: The make_http_soap_request function in ext/soap/php_http.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c (bsc#971611).
  • CVE-2016-2554: Stack-based buffer overflow in ext/phar/tar.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive (bsc#968284).
  • CVE-2015-7803: The phar_get_entry_data function in ext/phar/util.c in PHP allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that did not exist (bsc#949961).
  • CVE-2015-6831: Multiple use-after-free vulnerabilities in SPL in PHP allowed remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization (bsc#942291).
  • CVE-2015-6833: Directory traversal vulnerability in the PharData class in PHP allowed remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call (bsc#942296.
  • CVE-2015-6836: The SoapClient __call method in ext/soap/soap.c in PHP did not properly manage headers, which allowed remote attackers to execute arbitrary code via crafted serialized data that triggers a 'type confusion' in the serialize_function_call function (bsc#945428).
  • CVE-2015-6837: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation during initial error checking, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838 (bsc#945412).
  • CVE-2015-6838: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation after the principal argument loop, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837 (bsc#945412).
  • CVE-2015-5590: Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension (bsc#938719).
  • CVE-2015-5589: The phar_convert_to_other function in ext/phar/phar_object.c in PHP did not validate a file pointer a close operation, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call (bsc#938721).
  • CVE-2015-4602: The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935224).
  • CVE-2015-4599: The SoapFault::__toString method in ext/soap/soap.c in PHP allowed remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935226).
  • CVE-2015-4600: The SoapClient implementation in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods (bsc#935226).
  • CVE-2015-4601: PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600 (bsc#935226.
  • CVE-2015-4603: The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP allowed remote attackers to execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935234).
  • CVE-2015-4644: The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP did not validate token extraction for table names, which might allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352 (bsc#935274).
  • CVE-2015-4643: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022 (bsc#935275).
  • CVE-2015-3411: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files (bsc#935227).
  • CVE-2015-3412: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension (bsc#935229).
  • CVE-2015-4598: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files (bsc#935232).
  • CVE-2015-4148: The do_soap_call function in ext/soap/soap.c in PHP did not verify that the uri property is a string, which allowed remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a 'type confusion' issue (bsc#933227).
  • CVE-2015-4024: Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP allowed remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome (bsc#931421).
  • CVE-2015-4026: The pcntl_exec implementation in PHP truncates a pathname upon encountering a \x00 character, which might allowed remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243 (bsc#931776).
  • CVE-2015-4022: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow (bsc#931772).
  • CVE-2015-4021: The phar_parse_tarfile function in ext/phar/tar.c in PHP did not verify that the first character of a filename is different from the \0 character, which allowed remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive (bsc#931769).
  • CVE-2015-3329: Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP allowed remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive (bsc#928506).
  • CVE-2015-2783: ext/phar/phar.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions (bsc#928511).
  • CVE-2015-2787: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231 (bsc#924972).
  • CVE-2014-9709: The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function (bsc#923945).
  • CVE-2015-2301: Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file (bsc#922452).
  • CVE-2015-2305: Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) 32-bit platforms might have allowed context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow (bsc#921950).
  • CVE-2014-9705: Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP allowed remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries (bsc#922451).
  • CVE-2015-0273: Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP allowed remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function (bsc#918768).
  • CVE-2014-9652: The mconvert function in softmagic.c in file as used in the Fileinfo component in PHP did not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allowed remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file (bsc#917150).
  • CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
  • CVE-2015-0231: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142 (bsc#910659).
  • CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
  • CVE-2015-0232: The exif_process_unicode function in ext/exif/exif.c in PHP allowed remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image (bsc#914690).
  • CVE-2014-3670: The exif_ifd_make_value function in exif.c in the EXIF extension in PHP operates on floating-point arrays incorrectly, which allowed remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function (bsc#902357).
  • CVE-2014-3669: Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value (bsc#902360).
  • CVE-2014-3668: Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP allowed remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation (bsc#902368).
  • CVE-2014-5459: The PEAR_REST class in REST.php in PEAR in PHP allowed local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions (bsc#893849).
  • CVE-2014-3597: Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP allowed remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049 (bsc#893853).
  • CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments (bsc#886059).
  • CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments (bsc#886060).
  • CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allowed context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a 'type confusion' vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php (bsc#885961).
  • CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file (bsc#884986).
  • CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion (bsc#884987).
  • CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file as used in the Fileinfo component in PHP relies on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file (bsc#884989).
  • CVE-2014-3480: The cdf_count_chain function in cdf.c in file as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884990).
  • CVE-2014-3487: The cdf_read_property_info function in file as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884991).
  • CVE-2014-3515: The SPL component in PHP incorrectly anticipates that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to 'type confusion' issues in (1) ArrayObject and (2) SPLObjectStorage (bsc#884992).

These non-security issues were fixed:

  • bnc#935074: compare with SQL_NULL_DATA correctly
  • bnc#935074: fix segfault in odbc_fetch_array
  • bnc#919080: fix timezone map
  • bnc#925109: unserialize SoapClient type confusion

Список пакетов

SUSE Linux Enterprise Server 11 SP2-LTSS
apache2-mod_php53-5.3.17-47.1
php53-5.3.17-47.1
php53-bcmath-5.3.17-47.1
php53-bz2-5.3.17-47.1
php53-calendar-5.3.17-47.1
php53-ctype-5.3.17-47.1
php53-curl-5.3.17-47.1
php53-dba-5.3.17-47.1
php53-dom-5.3.17-47.1
php53-exif-5.3.17-47.1
php53-fastcgi-5.3.17-47.1
php53-fileinfo-5.3.17-47.1
php53-ftp-5.3.17-47.1
php53-gd-5.3.17-47.1
php53-gettext-5.3.17-47.1
php53-gmp-5.3.17-47.1
php53-iconv-5.3.17-47.1
php53-intl-5.3.17-47.1
php53-json-5.3.17-47.1
php53-ldap-5.3.17-47.1
php53-mbstring-5.3.17-47.1
php53-mcrypt-5.3.17-47.1
php53-mysql-5.3.17-47.1
php53-odbc-5.3.17-47.1
php53-openssl-5.3.17-47.1
php53-pcntl-5.3.17-47.1
php53-pdo-5.3.17-47.1
php53-pear-5.3.17-47.1
php53-pgsql-5.3.17-47.1
php53-pspell-5.3.17-47.1
php53-shmop-5.3.17-47.1
php53-snmp-5.3.17-47.1
php53-soap-5.3.17-47.1
php53-suhosin-5.3.17-47.1
php53-sysvmsg-5.3.17-47.1
php53-sysvsem-5.3.17-47.1
php53-sysvshm-5.3.17-47.1
php53-tokenizer-5.3.17-47.1
php53-wddx-5.3.17-47.1
php53-xmlreader-5.3.17-47.1
php53-xmlrpc-5.3.17-47.1
php53-xmlwriter-5.3.17-47.1
php53-xsl-5.3.17-47.1
php53-zip-5.3.17-47.1
php53-zlib-5.3.17-47.1

Описание

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки

Описание

sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bcmath-5.3.17-47.1
SUSE Linux Enterprise Server 11 SP2-LTSS:php53-bz2-5.3.17-47.1

Ссылки
Уязвимость SUSE-SU-2016:1638-1