[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2015:1187-01 -- Redhat rh-php56-php

ID: oval:org.secpod.oval:def:504917Date: (C)2021-02-03   (M)2024-02-19
Class: PATCHFamily: unix




PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP"s FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize function could cause a PHP application to crash or, possibly, execute arbitrary code. It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. Multiple flaws were found in the way the way PHP"s Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. Multiple flaws were found in PHP"s File Information extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. All rh-php56-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd24-httpd service must be restarted for the update to take effect.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
rh-php56-php
Reference:
RHSA-2015:1187-01
CVE-2015-2783
CVE-2015-3307
CVE-2015-3329
CVE-2015-3330
CVE-2015-3411
CVE-2015-3412
CVE-2015-4021
CVE-2015-4022
CVE-2015-4024
CVE-2015-4025
CVE-2015-4026
CVE-2015-4598
CVE-2015-4602
CVE-2015-4603
CVE-2015-4604
CVE-2015-4605
CVE-2015-4643
CVE-2015-4644
CVE    18
CVE-2015-4598
CVE-2015-4026
CVE-2015-4643
CVE-2015-3330
...
CPE    4
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:php:rh-php56-php
cpe:/o:redhat:enterprise_linux:7.0
...

© SecPod Technologies