[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-372 ---- php55

ID: oval:org.secpod.oval:def:1600078Date: (C)2016-01-19   (M)2023-12-07
Class: PATCHFamily: unix




acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file. A denial of service flaw was found in the way the File Information extension parsed certain Composite Document Format files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file. A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes" unserialize method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application. Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service via a crafted Pascal string in a FILE_PSTRING conversion. A heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT records. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record function to perform a DNS query.

Platform:
Amazon Linux AMI
Product:
php55
Reference:
ALAS-2014-372
CVE-2014-3981
CVE-2014-3479
CVE-2014-0207
CVE-2014-3515
CVE-2014-3478
CVE-2014-4049
CVE-2014-3487
CVE-2014-3480
CVE    8
CVE-2014-3480
CVE-2014-0207
CVE-2014-3478
CVE-2014-4049
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:php:php55

© SecPod Technologies