ID

VAR-201506-0319


CVE

CVE-2015-4147


TITLE

PHP of ext/soap/soap.c of SoapClient::__call Vulnerability in arbitrary code execution in method

Trust: 0.8

sources: JVNDB: JVNDB-2015-003053

DESCRIPTION

The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. PHP is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. The vulnerability stems from the program's failure to validate the '__default_headers' value in the array. The following versions are affected: PHP prior to 5.4.39, 5.5.x prior to 5.5.23, and 5.6.x prior to 5.6.7. 6) - i386, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: php security and bug fix update Advisory ID: RHSA-2015:1135-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1135.html Issue date: 2015-06-23 CVE Names: CVE-2014-8142 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0273 CVE-2015-2301 CVE-2015-2348 CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 CVE-2015-4602 CVE-2015-4603 CVE-2015-4604 CVE-2015-4605 ===================================================================== 1. Summary: Updated php packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330) A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) An uninitialized pointer use flaw was found in PHP's Exif extension. (CVE-2015-0232) An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) Multiple flaws were discovered in the way PHP performed object unserialization. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603) It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348, CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. (CVE-2015-2301, CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2014-9652, CVE-2015-4604, CVE-2015-4605) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) This update also fixes the following bugs: * The libgmp library in some cases terminated unexpectedly with a segmentation fault when being used with other libraries that use the GMP memory management. With this update, PHP no longer changes libgmp memory allocators, which prevents the described crash from occurring. (BZ#1212305) * When using the Open Database Connectivity (ODBC) API, the PHP process in some cases terminated unexpectedly with a segmentation fault. The underlying code has been adjusted to prevent this crash. (BZ#1212299) * Previously, running PHP on a big-endian system sometimes led to memory corruption in the fileinfo module. This update adjusts the behavior of the PHP pointer so that it can be freed without causing memory corruption. (BZ#1212298) All php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize() 1185397 - CVE-2015-0231 php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1188599 - CVE-2014-9652 file: out of bounds read in mconvert() 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1207682 - CVE-2015-2348 php: move_uploaded_file() NUL byte injection in file name 1213394 - CVE-2015-3330 php: pipelined request executed in deinitialized interpreter under httpd 2.4 1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions 1213442 - CVE-2015-4604 CVE-2015-4605 php: denial of service when processing a crafted file with Fileinfo 1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing 1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode() 1222485 - CVE-2015-4024 php: multipart/form-data request paring CPU usage DoS 1222538 - CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 php: type confusion issue in unserialize() with various SOAP methods 1223408 - CVE-2015-4025 php: CVE-2006-7243 regressions in 5.4+ 1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing 1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character 1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name 1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata() 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions 1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions 1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize 1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: php-5.4.16-36.el7_1.src.rpm ppc64: php-5.4.16-36.el7_1.ppc64.rpm php-cli-5.4.16-36.el7_1.ppc64.rpm php-common-5.4.16-36.el7_1.ppc64.rpm php-debuginfo-5.4.16-36.el7_1.ppc64.rpm php-gd-5.4.16-36.el7_1.ppc64.rpm php-ldap-5.4.16-36.el7_1.ppc64.rpm php-mysql-5.4.16-36.el7_1.ppc64.rpm php-odbc-5.4.16-36.el7_1.ppc64.rpm php-pdo-5.4.16-36.el7_1.ppc64.rpm php-pgsql-5.4.16-36.el7_1.ppc64.rpm php-process-5.4.16-36.el7_1.ppc64.rpm php-recode-5.4.16-36.el7_1.ppc64.rpm php-soap-5.4.16-36.el7_1.ppc64.rpm php-xml-5.4.16-36.el7_1.ppc64.rpm php-xmlrpc-5.4.16-36.el7_1.ppc64.rpm s390x: php-5.4.16-36.el7_1.s390x.rpm php-cli-5.4.16-36.el7_1.s390x.rpm php-common-5.4.16-36.el7_1.s390x.rpm php-debuginfo-5.4.16-36.el7_1.s390x.rpm php-gd-5.4.16-36.el7_1.s390x.rpm php-ldap-5.4.16-36.el7_1.s390x.rpm php-mysql-5.4.16-36.el7_1.s390x.rpm php-odbc-5.4.16-36.el7_1.s390x.rpm php-pdo-5.4.16-36.el7_1.s390x.rpm php-pgsql-5.4.16-36.el7_1.s390x.rpm php-process-5.4.16-36.el7_1.s390x.rpm php-recode-5.4.16-36.el7_1.s390x.rpm php-soap-5.4.16-36.el7_1.s390x.rpm php-xml-5.4.16-36.el7_1.s390x.rpm php-xmlrpc-5.4.16-36.el7_1.s390x.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: php-5.4.16-36.ael7b_1.src.rpm ppc64le: php-5.4.16-36.ael7b_1.ppc64le.rpm php-cli-5.4.16-36.ael7b_1.ppc64le.rpm php-common-5.4.16-36.ael7b_1.ppc64le.rpm php-debuginfo-5.4.16-36.ael7b_1.ppc64le.rpm php-gd-5.4.16-36.ael7b_1.ppc64le.rpm php-ldap-5.4.16-36.ael7b_1.ppc64le.rpm php-mysql-5.4.16-36.ael7b_1.ppc64le.rpm php-odbc-5.4.16-36.ael7b_1.ppc64le.rpm php-pdo-5.4.16-36.ael7b_1.ppc64le.rpm php-pgsql-5.4.16-36.ael7b_1.ppc64le.rpm php-process-5.4.16-36.ael7b_1.ppc64le.rpm php-recode-5.4.16-36.ael7b_1.ppc64le.rpm php-soap-5.4.16-36.ael7b_1.ppc64le.rpm php-xml-5.4.16-36.ael7b_1.ppc64le.rpm php-xmlrpc-5.4.16-36.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: php-bcmath-5.4.16-36.el7_1.ppc64.rpm php-dba-5.4.16-36.el7_1.ppc64.rpm php-debuginfo-5.4.16-36.el7_1.ppc64.rpm php-devel-5.4.16-36.el7_1.ppc64.rpm php-embedded-5.4.16-36.el7_1.ppc64.rpm php-enchant-5.4.16-36.el7_1.ppc64.rpm php-fpm-5.4.16-36.el7_1.ppc64.rpm php-intl-5.4.16-36.el7_1.ppc64.rpm php-mbstring-5.4.16-36.el7_1.ppc64.rpm php-mysqlnd-5.4.16-36.el7_1.ppc64.rpm php-pspell-5.4.16-36.el7_1.ppc64.rpm php-snmp-5.4.16-36.el7_1.ppc64.rpm s390x: php-bcmath-5.4.16-36.el7_1.s390x.rpm php-dba-5.4.16-36.el7_1.s390x.rpm php-debuginfo-5.4.16-36.el7_1.s390x.rpm php-devel-5.4.16-36.el7_1.s390x.rpm php-embedded-5.4.16-36.el7_1.s390x.rpm php-enchant-5.4.16-36.el7_1.s390x.rpm php-fpm-5.4.16-36.el7_1.s390x.rpm php-intl-5.4.16-36.el7_1.s390x.rpm php-mbstring-5.4.16-36.el7_1.s390x.rpm php-mysqlnd-5.4.16-36.el7_1.s390x.rpm php-pspell-5.4.16-36.el7_1.s390x.rpm php-snmp-5.4.16-36.el7_1.s390x.rpm x86_64: php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: php-bcmath-5.4.16-36.ael7b_1.ppc64le.rpm php-dba-5.4.16-36.ael7b_1.ppc64le.rpm php-debuginfo-5.4.16-36.ael7b_1.ppc64le.rpm php-devel-5.4.16-36.ael7b_1.ppc64le.rpm php-embedded-5.4.16-36.ael7b_1.ppc64le.rpm php-enchant-5.4.16-36.ael7b_1.ppc64le.rpm php-fpm-5.4.16-36.ael7b_1.ppc64le.rpm php-intl-5.4.16-36.ael7b_1.ppc64le.rpm php-mbstring-5.4.16-36.ael7b_1.ppc64le.rpm php-mysqlnd-5.4.16-36.ael7b_1.ppc64le.rpm php-pspell-5.4.16-36.ael7b_1.ppc64le.rpm php-snmp-5.4.16-36.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8142 https://access.redhat.com/security/cve/CVE-2014-9652 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0231 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2348 https://access.redhat.com/security/cve/CVE-2015-2783 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-3307 https://access.redhat.com/security/cve/CVE-2015-3329 https://access.redhat.com/security/cve/CVE-2015-3330 https://access.redhat.com/security/cve/CVE-2015-3411 https://access.redhat.com/security/cve/CVE-2015-3412 https://access.redhat.com/security/cve/CVE-2015-4021 https://access.redhat.com/security/cve/CVE-2015-4022 https://access.redhat.com/security/cve/CVE-2015-4024 https://access.redhat.com/security/cve/CVE-2015-4025 https://access.redhat.com/security/cve/CVE-2015-4026 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/cve/CVE-2015-4598 https://access.redhat.com/security/cve/CVE-2015-4599 https://access.redhat.com/security/cve/CVE-2015-4600 https://access.redhat.com/security/cve/CVE-2015-4601 https://access.redhat.com/security/cve/CVE-2015-4602 https://access.redhat.com/security/cve/CVE-2015-4603 https://access.redhat.com/security/cve/CVE-2015-4604 https://access.redhat.com/security/cve/CVE-2015-4605 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViR1aXlSAg2UNWIIRAuxPAJ42GLQVzvzc9kje0VjDv8NZWcPv6QCbBL+O dtqycPWs+07GhjmZ6NNx5Bg= =FREZ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-2658-1 July 06, 2015 php5 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in PHP. Software Description: - php5: HTML-embedded scripting language interpreter Details: Neal Poole and Tomas Hoger discovered that PHP incorrectly handled NULL bytes in file paths. (CVE-2015-3411, CVE-2015-3412, CVE-2015-4025, CVE-2015-4026, CVE-2015-4598) Emmanuel Law discovered that the PHP phar extension incorrectly handled filenames starting with a NULL byte. (CVE-2015-4021) Max Spelsberg discovered that PHP incorrectly handled the LIST command when connecting to remote FTP servers. (CVE-2015-4024) Andrea Palazzo discovered that the PHP Soap client incorrectly validated data types. (CVE-2015-4147) Andrea Palazzo discovered that the PHP Soap client incorrectly validated that the uri property is a string. A remote attacker could possibly use these issues to obtain sensitive information or cause a denial of service. This issue only affected Ubuntu 15.04. (CVE-2015-4644) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.2 php5-cgi 5.6.4+dfsg-4ubuntu6.2 php5-cli 5.6.4+dfsg-4ubuntu6.2 php5-fpm 5.6.4+dfsg-4ubuntu6.2 Ubuntu 14.10: libapache2-mod-php5 5.5.12+dfsg-2ubuntu4.6 php5-cgi 5.5.12+dfsg-2ubuntu4.6 php5-cli 5.5.12+dfsg-2ubuntu4.6 php5-fpm 5.5.12+dfsg-2ubuntu4.6 Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.11 php5-cgi 5.5.9+dfsg-1ubuntu4.11 php5-cli 5.5.9+dfsg-1ubuntu4.11 php5-fpm 5.5.9+dfsg-1ubuntu4.11 Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.19 php5-cgi 5.3.10-1ubuntu3.19 php5-cli 5.3.10-1ubuntu3.19 php5-fpm 5.3.10-1ubuntu3.19 In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201606-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: PHP: Multiple vulnerabilities Date: June 19, 2016 Bugs: #537586, #541098, #544186, #544330, #546872, #549538, #552408, #555576, #555830, #556952, #559612, #562882, #571254, #573892, #577376 ID: 201606-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP 5.4 users should upgrade to the latest 5.5 stable branch, as PHP 5.4 is now masked in Portage: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33" All PHP 5.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33" All PHP 5.6 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.19" References ========== [ 1 ] CVE-2013-6501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501 [ 2 ] CVE-2014-9705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705 [ 3 ] CVE-2014-9709 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709 [ 4 ] CVE-2015-0231 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231 [ 5 ] CVE-2015-0273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273 [ 6 ] CVE-2015-1351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351 [ 7 ] CVE-2015-1352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352 [ 8 ] CVE-2015-2301 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301 [ 9 ] CVE-2015-2348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348 [ 10 ] CVE-2015-2783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783 [ 11 ] CVE-2015-2787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787 [ 12 ] CVE-2015-3329 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329 [ 13 ] CVE-2015-3330 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330 [ 14 ] CVE-2015-4021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021 [ 15 ] CVE-2015-4022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022 [ 16 ] CVE-2015-4025 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025 [ 17 ] CVE-2015-4026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026 [ 18 ] CVE-2015-4147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147 [ 19 ] CVE-2015-4148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148 [ 20 ] CVE-2015-4642 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642 [ 21 ] CVE-2015-4643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643 [ 22 ] CVE-2015-4644 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644 [ 23 ] CVE-2015-6831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831 [ 24 ] CVE-2015-6832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832 [ 25 ] CVE-2015-6833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833 [ 26 ] CVE-2015-6834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834 [ 27 ] CVE-2015-6835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835 [ 28 ] CVE-2015-6836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836 [ 29 ] CVE-2015-6837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837 [ 30 ] CVE-2015-6838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838 [ 31 ] CVE-2015-7803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803 [ 32 ] CVE-2015-7804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201606-10 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . The php55 packages provide a recent stable release of PHP with the PEAR 1.9.4, memcache 3.0.8, and mongo 1.4.5 PECL extensions, and a number of additional utilities. (CVE-2014-9709) A use-after-free flaw was found in PHP's OPcache extension. This flaw could possibly lead to a disclosure of a portion of the server memory

Trust: 2.61

sources: NVD: CVE-2015-4147 // JVNDB: JVNDB-2015-003053 // BID: 73357 // VULHUB: VHN-82108 // VULMON: CVE-2015-4147 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 132406 // PACKETSTORM: 132531 // PACKETSTORM: 137539 // PACKETSTORM: 132158

AFFECTED PRODUCTS

vendor:phpmodel:phpscope:eqversion:5.6.3

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.6.0

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.6.2

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.6.5

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.6.4

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.6.6

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.0

Trust: 1.6

vendor:phpmodel:phpscope:eqversion:5.5.8

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.1

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.6

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.22

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.10

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.3

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.18

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.5

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.2

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.9

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.11

Trust: 1.0

vendor:phpmodel:phpscope:lteversion:5.4.38

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.21

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.7

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.12

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.20

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.13

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.19

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.5.14

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:5.6.7

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.6.x

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:5.5.23

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.5.x

Trust: 0.8

vendor:phpmodel:phpscope:eqversion:5.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.2.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.0

Trust: 0.3

vendor:redmodel:hat enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.7

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.2.1

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.9

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.9-2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.3

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.1.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.6

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.11

Trust: 0.3

vendor:phpmodel:pl2scope:eqversion:4.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.00

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.1.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.2.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.1.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.2.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.0.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.00

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.4

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.4.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.6

Trust: 0.3

vendor:phpmodel:pl1scope:eqversion:4.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:6.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:3.0.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:4.3.3

Trust: 0.3

sources: BID: 73357 // JVNDB: JVNDB-2015-003053 // CNNVD: CNNVD-201506-107 // NVD: CVE-2015-4147

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4147
value: HIGH

Trust: 1.0

NVD: CVE-2015-4147
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201506-107
value: HIGH

Trust: 0.6

VULHUB: VHN-82108
value: HIGH

Trust: 0.1

VULMON: CVE-2015-4147
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-4147
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-82108
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-82108 // VULMON: CVE-2015-4147 // JVNDB: JVNDB-2015-003053 // CNNVD: CNNVD-201506-107 // NVD: CVE-2015-4147

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-82108 // JVNDB: JVNDB-2015-003053 // NVD: CVE-2015-4147

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 132406 // PACKETSTORM: 132531 // CNNVD: CNNVD-201506-107

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201506-107

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003053

PATCH

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:https://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:https://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:Sec Bug #69085url:https://bugs.php.net/bug.php?id=69085

Trust: 0.8

title:PHP 5 ChangeLogurl:http://php.net/ChangeLog-5.php

Trust: 0.8

title:Red Hat: CVE-2015-4147url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-4147

Trust: 0.1

title:Ubuntu Security Notice: php5 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2658-1

Trust: 0.1

title:Apple: OS X Yosemite v10.10.5 and Security Update 2015-006url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=9834d0d73bf28fb80d3390930bafd906

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=8ad80411af3e936eb2998df70506cc71

Trust: 0.1

sources: VULMON: CVE-2015-4147 // JVNDB: JVNDB-2015-003053

EXTERNAL IDS

db:NVDid:CVE-2015-4147

Trust: 3.5

db:OPENWALLid:OSS-SECURITY/2015/06/01/4

Trust: 2.6

db:BIDid:73357

Trust: 2.1

db:SECTRACKid:1032459

Trust: 1.2

db:JVNDBid:JVNDB-2015-003053

Trust: 0.8

db:CNNVDid:CNNVD-201506-107

Trust: 0.7

db:VULHUBid:VHN-82108

Trust: 0.1

db:VULMONid:CVE-2015-4147

Trust: 0.1

db:PACKETSTORMid:132161

Trust: 0.1

db:PACKETSTORMid:132618

Trust: 0.1

db:PACKETSTORMid:132406

Trust: 0.1

db:PACKETSTORMid:132531

Trust: 0.1

db:PACKETSTORMid:137539

Trust: 0.1

db:PACKETSTORMid:132158

Trust: 0.1

sources: VULHUB: VHN-82108 // VULMON: CVE-2015-4147 // BID: 73357 // JVNDB: JVNDB-2015-003053 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 132406 // PACKETSTORM: 132531 // PACKETSTORM: 137539 // PACKETSTORM: 132158 // CNNVD: CNNVD-201506-107 // NVD: CVE-2015-4147

REFERENCES

url:http://openwall.com/lists/oss-security/2015/06/01/4

Trust: 2.6

url:https://bugs.php.net/bug.php?id=69085

Trust: 2.1

url:http://www.securityfocus.com/bid/73357

Trust: 1.8

url:http://php.net/changelog-5.php

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2015-1135.html

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 1.5

url:https://security.gentoo.org/glsa/201606-10

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1053.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1066.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1218.html

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.2

url:https://support.apple.com/kb/ht205031

Trust: 1.2

url:http://www.securitytracker.com/id/1032459

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4147

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4147

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-4148

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-4147

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2015-4147

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-9705

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2015-2301

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2015-2787

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-9709

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2015-0273

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2015-0231

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-2348

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-4148

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-0232

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-0232

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-0273

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2014-9705

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-2787

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-2301

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2014-9709

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-4021

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-4026

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-4022

Trust: 0.4

url:http://www.php.net/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 0.3

url:https://www.alienvault.com/forums/discussion/6075/security-advisory-alienvault-v5-2-addresses-55-vulnerabilities

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098669

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-8142

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1351

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-2348

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2014-8142

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-9652

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2014-9652

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-0231

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4601

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3411

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4600

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3412

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4599

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4598

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4024

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4602

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3329

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2783

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4025

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-1351

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-9427

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2305

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9427

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-2305

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4603

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4024

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4021

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4600

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3307

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3411

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4022

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-2783

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4602

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3307

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4026

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3412

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4599

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3329

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4598

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4601

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4603

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4644

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4643

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1352

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/19.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39203

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2658-1/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9425

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9425

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4604

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3330

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4605

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4605

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu6.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.5.12+dfsg-2ubuntu4.6

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-2658-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4604

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.19

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2301

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1352

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2348

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9709

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6831

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0273

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4021

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4642

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6832

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6831

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3330

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4642

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2787

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3329

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1351

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4025

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4644

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9705

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6833

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-1352

Trust: 0.1

sources: VULHUB: VHN-82108 // VULMON: CVE-2015-4147 // BID: 73357 // JVNDB: JVNDB-2015-003053 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 132406 // PACKETSTORM: 132531 // PACKETSTORM: 137539 // PACKETSTORM: 132158 // CNNVD: CNNVD-201506-107 // NVD: CVE-2015-4147

CREDITS

Andrea Palazzo

Trust: 0.9

sources: BID: 73357 // CNNVD: CNNVD-201506-107

SOURCES

db:VULHUBid:VHN-82108
db:VULMONid:CVE-2015-4147
db:BIDid:73357
db:JVNDBid:JVNDB-2015-003053
db:PACKETSTORMid:132161
db:PACKETSTORMid:132618
db:PACKETSTORMid:132406
db:PACKETSTORMid:132531
db:PACKETSTORMid:137539
db:PACKETSTORMid:132158
db:CNNVDid:CNNVD-201506-107
db:NVDid:CVE-2015-4147

LAST UPDATE DATE

2024-11-23T21:11:50.139000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-82108date:2018-01-05T00:00:00
db:VULMONid:CVE-2015-4147date:2018-01-05T00:00:00
db:BIDid:73357date:2016-07-06T12:22:00
db:JVNDBid:JVNDB-2015-003053date:2015-08-31T00:00:00
db:CNNVDid:CNNVD-201506-107date:2015-06-10T00:00:00
db:NVDid:CVE-2015-4147date:2024-11-21T02:30:31.083

SOURCES RELEASE DATE

db:VULHUBid:VHN-82108date:2015-06-09T00:00:00
db:VULMONid:CVE-2015-4147date:2015-06-09T00:00:00
db:BIDid:73357date:2015-03-17T00:00:00
db:JVNDBid:JVNDB-2015-003053date:2015-06-12T00:00:00
db:PACKETSTORMid:132161date:2015-06-04T16:15:24
db:PACKETSTORMid:132618date:2015-07-09T23:16:17
db:PACKETSTORMid:132406date:2015-06-23T14:07:16
db:PACKETSTORMid:132531date:2015-07-07T00:23:34
db:PACKETSTORMid:137539date:2016-06-19T15:55:00
db:PACKETSTORMid:132158date:2015-06-04T16:12:40
db:CNNVDid:CNNVD-201506-107date:2015-03-17T00:00:00
db:NVDid:CVE-2015-4147date:2015-06-09T18:59:09.503