The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of PHP 7: six vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP 7.
Severity of this weakness: 3/4.
Number of vulnerabilities in this bulletin: 6.
Creation date: 03/03/2016.
Références of this bulletin: 71449, 71450, 71561, 71584, 71610, 71637, CVE-2016-3185, CVE-2016-4344, CVE-2016-4345, CVE-2016-4346, openSUSE-SU-2016:1524-1, SUSE-SU-2016:1145-1, SUSE-SU-2016:1581-1, SUSE-SU-2016:1638-1, USN-2952-1, USN-2952-2, VIGILANCE-VUL-19098.

Description of the vulnerability

Several vulnerabilities were announced in PHP 7.

An attacker can generate an integer overflow in php_implode(), in order to trigger a denial of service, and possibly to run code. [severity:3/4; 71449]

An attacker can generate an integer overflow in php_str_to_str_ex(), in order to trigger a denial of service, and possibly to run code. [severity:3/4; 71450]

An attacker can generate a buffer overflow in xml/filter_url/addcslashes, in order to trigger a denial of service, and possibly to run code. [severity:3/4; 71637, CVE-2016-4344, CVE-2016-4345, CVE-2016-4346]

An attacker can force the usage of a freed memory area in ZCG, in order to trigger a denial of service, and possibly to run code. [severity:3/4; 71584]

An attacker can generate a memory corruption in make_http_soap_request(), in order to trigger a denial of service, and possibly to run code. [severity:3/4; 71610, CVE-2016-3185]

An attacker can force a NULL pointer to be dereferenced in Zip::ExtractTo, in order to trigger a denial of service. [severity:1/4; 71561]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness bulletin impacts software or systems such as openSUSE Leap, PHP, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat announce is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 6 vulnerabilities.

An attacker with a expert ability can exploit this threat announce.

Solutions for this threat

openSUSE Leap 42.1: new php5 packages (06/06/2016).
New packages are available:
  openSUSE Leap 42.1: php5 5.5.14-50.1, apache2-mod_php5 5.5.14-50.1

PHP: version 7.0.4.
The version 7.0.4 is fixed:
  http://php.net/downloads

SUSE LE 11: new php53 packages (15/06/2016).
New packages are available:
  SUSE LE 11 SP4: apache2-mod_php53 5.3.17-71.1, php53 5.3.17-71.1
  SUSE LE 11 SP3: apache2-mod_php53 5.3.17-71.1, php53 5.3.17-71.1

SUSE LE 11 SP2: new php53 packages (21/06/2016).
New packages are available:
  SUSE LE 11 SP2: apache2-mod_php53 5.3.17-47.1, php53 5.3.17-47.1

SUSE LE 11 SP4: new php53 packages.
New packages are available:
  SUSE LE 11 SP4: php53 5.3.17-59.1

Ubuntu: new php5 packages (22/04/2016).
New packages are available:
  Ubuntu 15.10: libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.3, php5 5.6.11+dfsg-1ubuntu3.3
  Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.16, php5 5.5.9+dfsg-1ubuntu4.16
  Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.22, php5 5.3.10-1ubuntu3.22
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerabilities announces. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.