Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:2522-1

Опубликовано: 18 сент. 2017
Источник: suse-cvrf

Описание

Security update for php53

This update for php53 fixes the several issues.

These security issues were fixed:

  • CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
  • CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
  • CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
  • CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
  • CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
  • CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
  • CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
  • CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
  • CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).

Список пакетов

SUSE Linux Enterprise Server 11 SP4
apache2-mod_php53-5.3.17-112.5.1
php53-5.3.17-112.5.1
php53-bcmath-5.3.17-112.5.1
php53-bz2-5.3.17-112.5.1
php53-calendar-5.3.17-112.5.1
php53-ctype-5.3.17-112.5.1
php53-curl-5.3.17-112.5.1
php53-dba-5.3.17-112.5.1
php53-dom-5.3.17-112.5.1
php53-exif-5.3.17-112.5.1
php53-fastcgi-5.3.17-112.5.1
php53-fileinfo-5.3.17-112.5.1
php53-ftp-5.3.17-112.5.1
php53-gd-5.3.17-112.5.1
php53-gettext-5.3.17-112.5.1
php53-gmp-5.3.17-112.5.1
php53-iconv-5.3.17-112.5.1
php53-intl-5.3.17-112.5.1
php53-json-5.3.17-112.5.1
php53-ldap-5.3.17-112.5.1
php53-mbstring-5.3.17-112.5.1
php53-mcrypt-5.3.17-112.5.1
php53-mysql-5.3.17-112.5.1
php53-odbc-5.3.17-112.5.1
php53-openssl-5.3.17-112.5.1
php53-pcntl-5.3.17-112.5.1
php53-pdo-5.3.17-112.5.1
php53-pear-5.3.17-112.5.1
php53-pgsql-5.3.17-112.5.1
php53-pspell-5.3.17-112.5.1
php53-shmop-5.3.17-112.5.1
php53-snmp-5.3.17-112.5.1
php53-soap-5.3.17-112.5.1
php53-suhosin-5.3.17-112.5.1
php53-sysvmsg-5.3.17-112.5.1
php53-sysvsem-5.3.17-112.5.1
php53-sysvshm-5.3.17-112.5.1
php53-tokenizer-5.3.17-112.5.1
php53-wddx-5.3.17-112.5.1
php53-xmlreader-5.3.17-112.5.1
php53-xmlrpc-5.3.17-112.5.1
php53-xmlwriter-5.3.17-112.5.1
php53-xsl-5.3.17-112.5.1
php53-zip-5.3.17-112.5.1
php53-zlib-5.3.17-112.5.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
apache2-mod_php53-5.3.17-112.5.1
php53-5.3.17-112.5.1
php53-bcmath-5.3.17-112.5.1
php53-bz2-5.3.17-112.5.1
php53-calendar-5.3.17-112.5.1
php53-ctype-5.3.17-112.5.1
php53-curl-5.3.17-112.5.1
php53-dba-5.3.17-112.5.1
php53-dom-5.3.17-112.5.1
php53-exif-5.3.17-112.5.1
php53-fastcgi-5.3.17-112.5.1
php53-fileinfo-5.3.17-112.5.1
php53-ftp-5.3.17-112.5.1
php53-gd-5.3.17-112.5.1
php53-gettext-5.3.17-112.5.1
php53-gmp-5.3.17-112.5.1
php53-iconv-5.3.17-112.5.1
php53-intl-5.3.17-112.5.1
php53-json-5.3.17-112.5.1
php53-ldap-5.3.17-112.5.1
php53-mbstring-5.3.17-112.5.1
php53-mcrypt-5.3.17-112.5.1
php53-mysql-5.3.17-112.5.1
php53-odbc-5.3.17-112.5.1
php53-openssl-5.3.17-112.5.1
php53-pcntl-5.3.17-112.5.1
php53-pdo-5.3.17-112.5.1
php53-pear-5.3.17-112.5.1
php53-pgsql-5.3.17-112.5.1
php53-pspell-5.3.17-112.5.1
php53-shmop-5.3.17-112.5.1
php53-snmp-5.3.17-112.5.1
php53-soap-5.3.17-112.5.1
php53-suhosin-5.3.17-112.5.1
php53-sysvmsg-5.3.17-112.5.1
php53-sysvsem-5.3.17-112.5.1
php53-sysvshm-5.3.17-112.5.1
php53-tokenizer-5.3.17-112.5.1
php53-wddx-5.3.17-112.5.1
php53-xmlreader-5.3.17-112.5.1
php53-xmlrpc-5.3.17-112.5.1
php53-xmlwriter-5.3.17-112.5.1
php53-xsl-5.3.17-112.5.1
php53-zip-5.3.17-112.5.1
php53-zlib-5.3.17-112.5.1
SUSE Linux Enterprise Software Development Kit 11 SP4
php53-devel-5.3.17-112.5.1
php53-imap-5.3.17-112.5.1
php53-posix-5.3.17-112.5.1
php53-readline-5.3.17-112.5.1
php53-sockets-5.3.17-112.5.1
php53-sqlite-5.3.17-112.5.1
php53-tidy-5.3.17-112.5.1

Описание

Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not an independently fixable security issue relative to CVE-2017-11145. Notes: none.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки

Описание

The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:apache2-mod_php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bcmath-5.3.17-112.5.1
SUSE Linux Enterprise Server 11 SP4:php53-bz2-5.3.17-112.5.1

Ссылки
Уязвимость SUSE-SU-2017:2522-1