ID

VAR-201605-0133


CVE

CVE-2015-8865


TITLE

PHP of Fileinfo Used by components file of funcs.c of file_check_mem Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-007175

DESCRIPTION

The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. PHP is prone to a denial-of-service vulnerability. Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community; Fileinfo is one of them used to display file attributes and support batch modification of its Components of properties. The vulnerability stems from the fact that the program does not correctly handle continuation-level jumps. The following versions are affected: PHP prior to 5.5.34, 5.6.x prior to 5.6.20, 7.x prior to 7.0.5, and prior to file 5.23. ============================================================================ Ubuntu Security Notice USN-2984-1 May 24, 2016 php5, php7.0 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in PHP. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865) Hans Jerry Illikainen discovered that the PHP Zip extension incorrectly handled certain malformed Zip archives. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3078) It was discovered that PHP incorrectly handled invalid indexes in the SplDoublyLinkedList class. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132) It was discovered that the PHP rawurlencode() function incorrectly handled large strings. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4070) It was discovered that the PHP php_snmp_error() function incorrectly handled string formatting. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071) It was discovered that the PHP phar extension incorrectly handled certain filenames in archives. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4072) It was discovered that the PHP mb_strcut() function incorrectly handled string formatting. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073) It was discovered that the PHP phar extension incorrectly handled certain archive files. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2016-4342, CVE-2016-4343) It was discovered that the PHP bcpowmod() function incorrectly handled memory. (CVE-2016-4537, CVE-2016-4538) It was discovered that the PHP XML parser incorrectly handled certain malformed XML data. (CVE-2016-4539) It was discovered that certain PHP grapheme functions incorrectly handled negative offsets. (CVE-2016-4540, CVE-2016-4541) It was discovered that PHP incorrectly handled certain malformed EXIF tags. (CVE-2016-4542, CVE-2016-4543, CVE-2016-4544) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.4-7ubuntu2.1 php7.0-cgi 7.0.4-7ubuntu2.1 php7.0-cli 7.0.4-7ubuntu2.1 php7.0-fpm 7.0.4-7ubuntu2.1 Ubuntu 15.10: libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.4 php5-cgi 5.6.11+dfsg-1ubuntu3.4 php5-cli 5.6.11+dfsg-1ubuntu3.4 php5-fpm 5.6.11+dfsg-1ubuntu3.4 Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.17 php5-cgi 5.5.9+dfsg-1ubuntu4.17 php5-cli 5.5.9+dfsg-1ubuntu4.17 php5-fpm 5.5.9+dfsg-1ubuntu4.17 Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.23 php5-cgi 5.3.10-1ubuntu3.23 php5-cli 5.3.10-1ubuntu3.23 php5-fpm 5.3.10-1ubuntu3.23 In general, a standard system update will make all the necessary changes. Software Description: - file: Tool to determine file types Details: USN-3686-1 fixed a vulnerability in file. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-php56 security, bug fix, and enhancement update Advisory ID: RHSA-2016:2750-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2750.html Issue date: 2016-11-15 CVE Names: CVE-2013-7456 CVE-2014-9767 CVE-2015-2325 CVE-2015-2326 CVE-2015-2327 CVE-2015-2328 CVE-2015-3210 CVE-2015-3217 CVE-2015-5073 CVE-2015-8381 CVE-2015-8383 CVE-2015-8384 CVE-2015-8385 CVE-2015-8386 CVE-2015-8388 CVE-2015-8391 CVE-2015-8392 CVE-2015-8395 CVE-2015-8835 CVE-2015-8865 CVE-2015-8866 CVE-2015-8867 CVE-2015-8873 CVE-2015-8874 CVE-2015-8876 CVE-2015-8877 CVE-2015-8879 CVE-2016-1903 CVE-2016-2554 CVE-2016-3074 CVE-2016-3141 CVE-2016-3142 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072 CVE-2016-4073 CVE-2016-4342 CVE-2016-4343 CVE-2016-4473 CVE-2016-4537 CVE-2016-4538 CVE-2016-4539 CVE-2016-4540 CVE-2016-4541 CVE-2016-4542 CVE-2016-4543 CVE-2016-4544 CVE-2016-5093 CVE-2016-5094 CVE-2016-5096 CVE-2016-5114 CVE-2016-5399 CVE-2016-5766 CVE-2016-5767 CVE-2016-5768 CVE-2016-5770 CVE-2016-5771 CVE-2016-5772 CVE-2016-5773 CVE-2016-6128 CVE-2016-6207 CVE-2016-6288 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6294 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297 CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 ===================================================================== 1. Summary: An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The rh-php56 packages provide a recent stable release of PHP with PEAR 1.9.5 and enhanced language features including constant expressions, variadic functions, arguments unpacking, and the interactive debuger. The memcache, mongo, and XDebug extensions are also included. The rh-php56 Software Collection has been upgraded to version 5.6.25, which provides a number of bug fixes and enhancements over the previous version. (BZ#1356157, BZ#1365401) Security Fixes in the rh-php56-php component: * Several Moderate and Low impact security issues were found in PHP. Space precludes documenting each of these issues in this advisory. Refer to the CVE links in the References section for a description of each of these vulnerabilities. (CVE-2013-7456, CVE-2014-9767, CVE-2015-8835, CVE-2015-8865, CVE-2015-8866, CVE-2015-8867, CVE-2015-8873, CVE-2015-8874, CVE-2015-8876, CVE-2015-8877, CVE-2015-8879, CVE-2016-1903, CVE-2016-2554, CVE-2016-3074, CVE-2016-3141, CVE-2016-3142, CVE-2016-4070, CVE-2016-4071, CVE-2016-4072, CVE-2016-4073, CVE-2016-4342, CVE-2016-4343, CVE-2016-4473, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539, CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543, CVE-2016-4544, CVE-2016-5093, CVE-2016-5094, CVE-2016-5096, CVE-2016-5114, CVE-2016-5399, CVE-2016-5766, CVE-2016-5767, CVE-2016-5768, CVE-2016-5770, CVE-2016-5771, CVE-2016-5772, CVE-2016-5773, CVE-2016-6128, CVE-2016-6207, CVE-2016-6288, CVE-2016-6289, CVE-2016-6290, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, CVE-2016-6297, CVE-2016-7124, CVE-2016-7125, CVE-2016-7126, CVE-2016-7127, CVE-2016-7128, CVE-2016-7129, CVE-2016-7130, CVE-2016-7131, CVE-2016-7132) * Multiple flaws were found in the PCRE library included with the rh-php56-php packages for Red Hat Enterprise Linux 6. (CVE-2015-2325, CVE-2015-2326, CVE-2015-2327, CVE-2015-2328, CVE-2015-3210, CVE-2015-3217, CVE-2015-5073, CVE-2015-8381, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385, CVE-2015-8386, CVE-2015-8388, CVE-2015-8391, CVE-2015-8392, CVE-2015-8395) Red Hat would like to thank Hans Jerry Illikainen for reporting CVE-2016-3074, CVE-2016-4473, and CVE-2016-5399. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1207198 - CVE-2015-2325 pcre: heap buffer overflow in compile_branch() 1207202 - CVE-2015-2326 pcre: heap buffer over-read in pcre_compile2() (8.37/23) 1228283 - CVE-2015-3217 pcre: stack overflow caused by mishandled group empty match (8.38/11) 1237223 - CVE-2015-5073 CVE-2015-8388 pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) 1260716 - CVE-2014-9767 php: ZipArchive::extractTo allows for directory traversal when creating directories 1285399 - CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20) 1285408 - CVE-2015-2327 pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19) 1287614 - CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group (8.38/3) 1287623 - CVE-2015-3210 CVE-2015-8384 pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4) 1287629 - CVE-2015-8385 pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) 1287636 - CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6) 1287671 - CVE-2015-8391 pcre: inefficient posix character class syntax check (8.38/16) 1287690 - CVE-2015-8392 pcre: buffer overflow caused by patterns with duplicated named groups with (?| (8.38/27) 1287711 - CVE-2015-8381 CVE-2015-8395 pcre: Buffer overflow caused by duplicate named references (8.38/36) 1297710 - CVE-2016-5114 php: out-of-bounds write in fpm_log.c 1297717 - CVE-2016-1903 php: Out-of-bounds memory read via gdImageRotateInterpolated 1305536 - CVE-2016-4342 php: use of uninitialized pointer in PharFileInfo::getContent 1305543 - CVE-2016-2554 php: buffer overflow in handling of long link names in tar phar archives 1315312 - CVE-2016-3142 php: Out-of-bounds read in phar_parse_zipfile() 1315328 - CVE-2016-3141 php: Use after free in WDDX Deserialize when processing XML data 1321893 - CVE-2016-3074 php: Signedness vulnerability causing heap overflow in libgd 1323074 - CVE-2015-8835 php: type confusion issue in Soap Client call() method 1323103 - CVE-2016-4073 php: Negative size parameter in memcpy 1323106 - CVE-2016-4072 php: Invalid memory write in phar on filename containing \0 inside name 1323108 - CVE-2016-4071 php: Format string vulnerability in php_snmp_error() 1323114 - CVE-2016-4070 php: Integer overflow in php_raw_url_encode 1323118 - CVE-2015-8865 file: Buffer over-write in finfo_open with malformed magic file 1330418 - CVE-2015-8866 php: libxml_disable_entity_loader setting is shared between threads 1330420 - CVE-2015-8867 php: openssl_random_pseudo_bytes() is not cryptographically secure 1332454 - CVE-2016-4343 php: Uninitialized pointer in phar_make_dirstream() 1332860 - CVE-2016-4537 CVE-2016-4538 php: bcpowmod accepts negative scale causing heap buffer overflow corrupting _one_ definition 1332865 - CVE-2016-4542 CVE-2016-4543 CVE-2016-4544 php: Out-of-bounds heap memory read in exif_read_data() caused by malformed input 1332872 - CVE-2016-4540 CVE-2016-4541 php: OOB read in grapheme_stripos and grapheme_strpos when negative offset is used 1332877 - CVE-2016-4539 php: xml_parse_into_struct() can crash when XML parser is re-used 1336772 - CVE-2015-8874 gd: gdImageFillToBorder deep recursion leading to stack overflow 1336775 - CVE-2015-8873 php: Stack consumption vulnerability in Zend/zend_exceptions.c 1338896 - CVE-2015-8876 php: Zend/zend_exceptions.c does not validate certain Exception objects 1338907 - CVE-2015-8877 gd: gdImageScaleTwoPass function in gd_interpolation.c uses inconsistent allocate and free approaches 1338912 - CVE-2015-8879 php: odbc_bindcols function mishandles driver behavior for SQL_WVARCHAR columns 1339590 - CVE-2016-5093 php: improper nul termination leading to out-of-bounds read in get_icu_value_internal 1339949 - CVE-2016-5096 php: Integer underflow causing arbitrary null write in fread/gzread 1340433 - CVE-2013-7456 gd: incorrect boundary adjustment in _gdContributionsCalc 1340738 - CVE-2016-5094 php: Integer overflow in php_html_entities() 1347772 - CVE-2016-4473 php: Invalid free() instead of efree() in phar_extract_file() 1351068 - CVE-2016-5766 gd: Integer Overflow in _gd2GetHeader() resulting in heap overflow 1351069 - CVE-2016-5767 gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow 1351168 - CVE-2016-5768 php: Double free in _php_mb_regex_ereg_replace_exec 1351171 - CVE-2016-5770 php: Int/size_t confusion in SplFileObject::fread 1351173 - CVE-2016-5771 php: Use After Free Vulnerability in PHP's GC algorithm and unserialize 1351175 - CVE-2016-5772 php: Double Free Corruption in wddx_deserialize 1351179 - CVE-2016-5773 php: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize 1351603 - CVE-2016-6128 gd: Invalid color index not properly handled 1358395 - CVE-2016-5399 php: Improper error handling in bzread() 1359698 - CVE-2016-6289 php: Integer overflow leads to buffer overflow in virtual_file_ex 1359710 - CVE-2016-6290 php: Use after free in unserialize() with Unexpected Session Deserialization 1359718 - CVE-2016-6291 php: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE 1359756 - CVE-2016-6292 php: Null pointer dereference in exif_process_user_comment 1359800 - CVE-2016-6207 php,gd: Integer overflow error within _gdContributionsAlloc() 1359811 - CVE-2016-6294 php: Out-of-bounds access in locale_accept_from_http 1359815 - CVE-2016-6295 php: Use after free in SNMP with GC and unserialize() 1359822 - CVE-2016-6296 php: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c 1359828 - CVE-2016-6297 php: Stack-based buffer overflow vulnerability in php_stream_zip_opener 1360322 - CVE-2016-6288 php: Buffer over-read in php_url_parse_ex 1374697 - CVE-2016-7124 php: bypass __wakeup() in deserialization of an unexpected object 1374698 - CVE-2016-7125 php: Session Data Injection Vulnerability 1374699 - CVE-2016-7126 php: select_colors write out-of-bounds 1374701 - CVE-2016-7127 php: imagegammacorrect allows arbitrary write access 1374704 - CVE-2016-7128 php: Memory Leakage In exif_process_IFD_in_TIFF 1374705 - CVE-2016-7129 php: wddx_deserialize allows illegal memory access 1374707 - CVE-2016-7130 php: wddx_deserialize null dereference 1374708 - CVE-2016-7131 php: wddx_deserialize null dereference with invalid xml 1374711 - CVE-2016-7132 php: wddx_deserialize null dereference in php_wddx_pop_element 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: rh-php56-2.3-1.el6.src.rpm rh-php56-php-5.6.25-1.el6.src.rpm rh-php56-php-pear-1.9.5-4.el6.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el6.noarch.rpm x86_64: rh-php56-2.3-1.el6.x86_64.rpm rh-php56-php-5.6.25-1.el6.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm rh-php56-php-common-5.6.25-1.el6.x86_64.rpm rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm rh-php56-php-process-5.6.25-1.el6.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm rh-php56-runtime-2.3-1.el6.x86_64.rpm rh-php56-scldevel-2.3-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: rh-php56-2.3-1.el6.src.rpm rh-php56-php-5.6.25-1.el6.src.rpm rh-php56-php-pear-1.9.5-4.el6.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el6.noarch.rpm x86_64: rh-php56-2.3-1.el6.x86_64.rpm rh-php56-php-5.6.25-1.el6.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm rh-php56-php-common-5.6.25-1.el6.x86_64.rpm rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm rh-php56-php-process-5.6.25-1.el6.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm rh-php56-runtime-2.3-1.el6.x86_64.rpm rh-php56-scldevel-2.3-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: rh-php56-2.3-1.el6.src.rpm rh-php56-php-5.6.25-1.el6.src.rpm rh-php56-php-pear-1.9.5-4.el6.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el6.noarch.rpm x86_64: rh-php56-2.3-1.el6.x86_64.rpm rh-php56-php-5.6.25-1.el6.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm rh-php56-php-common-5.6.25-1.el6.x86_64.rpm rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm rh-php56-php-process-5.6.25-1.el6.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm rh-php56-runtime-2.3-1.el6.x86_64.rpm rh-php56-scldevel-2.3-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-php56-2.3-1.el7.src.rpm rh-php56-php-5.6.25-1.el7.src.rpm rh-php56-php-pear-1.9.5-4.el7.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el7.noarch.rpm x86_64: rh-php56-2.3-1.el7.x86_64.rpm rh-php56-php-5.6.25-1.el7.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm rh-php56-php-common-5.6.25-1.el7.x86_64.rpm rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm rh-php56-php-process-5.6.25-1.el7.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm rh-php56-runtime-2.3-1.el7.x86_64.rpm rh-php56-scldevel-2.3-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: rh-php56-2.3-1.el7.src.rpm rh-php56-php-5.6.25-1.el7.src.rpm rh-php56-php-pear-1.9.5-4.el7.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el7.noarch.rpm x86_64: rh-php56-2.3-1.el7.x86_64.rpm rh-php56-php-5.6.25-1.el7.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm rh-php56-php-common-5.6.25-1.el7.x86_64.rpm rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm rh-php56-php-process-5.6.25-1.el7.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm rh-php56-runtime-2.3-1.el7.x86_64.rpm rh-php56-scldevel-2.3-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3): Source: rh-php56-2.3-1.el7.src.rpm rh-php56-php-5.6.25-1.el7.src.rpm rh-php56-php-pear-1.9.5-4.el7.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el7.noarch.rpm x86_64: rh-php56-2.3-1.el7.x86_64.rpm rh-php56-php-5.6.25-1.el7.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm rh-php56-php-common-5.6.25-1.el7.x86_64.rpm rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm rh-php56-php-process-5.6.25-1.el7.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm rh-php56-runtime-2.3-1.el7.x86_64.rpm rh-php56-scldevel-2.3-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-php56-2.3-1.el7.src.rpm rh-php56-php-5.6.25-1.el7.src.rpm rh-php56-php-pear-1.9.5-4.el7.src.rpm noarch: rh-php56-php-pear-1.9.5-4.el7.noarch.rpm x86_64: rh-php56-2.3-1.el7.x86_64.rpm rh-php56-php-5.6.25-1.el7.x86_64.rpm rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm rh-php56-php-common-5.6.25-1.el7.x86_64.rpm rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm rh-php56-php-process-5.6.25-1.el7.x86_64.rpm rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm rh-php56-runtime-2.3-1.el7.x86_64.rpm rh-php56-scldevel-2.3-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-7456 https://access.redhat.com/security/cve/CVE-2014-9767 https://access.redhat.com/security/cve/CVE-2015-2325 https://access.redhat.com/security/cve/CVE-2015-2326 https://access.redhat.com/security/cve/CVE-2015-2327 https://access.redhat.com/security/cve/CVE-2015-2328 https://access.redhat.com/security/cve/CVE-2015-3210 https://access.redhat.com/security/cve/CVE-2015-3217 https://access.redhat.com/security/cve/CVE-2015-5073 https://access.redhat.com/security/cve/CVE-2015-8381 https://access.redhat.com/security/cve/CVE-2015-8383 https://access.redhat.com/security/cve/CVE-2015-8384 https://access.redhat.com/security/cve/CVE-2015-8385 https://access.redhat.com/security/cve/CVE-2015-8386 https://access.redhat.com/security/cve/CVE-2015-8388 https://access.redhat.com/security/cve/CVE-2015-8391 https://access.redhat.com/security/cve/CVE-2015-8392 https://access.redhat.com/security/cve/CVE-2015-8395 https://access.redhat.com/security/cve/CVE-2015-8835 https://access.redhat.com/security/cve/CVE-2015-8865 https://access.redhat.com/security/cve/CVE-2015-8866 https://access.redhat.com/security/cve/CVE-2015-8867 https://access.redhat.com/security/cve/CVE-2015-8873 https://access.redhat.com/security/cve/CVE-2015-8874 https://access.redhat.com/security/cve/CVE-2015-8876 https://access.redhat.com/security/cve/CVE-2015-8877 https://access.redhat.com/security/cve/CVE-2015-8879 https://access.redhat.com/security/cve/CVE-2016-1903 https://access.redhat.com/security/cve/CVE-2016-2554 https://access.redhat.com/security/cve/CVE-2016-3074 https://access.redhat.com/security/cve/CVE-2016-3141 https://access.redhat.com/security/cve/CVE-2016-3142 https://access.redhat.com/security/cve/CVE-2016-4070 https://access.redhat.com/security/cve/CVE-2016-4071 https://access.redhat.com/security/cve/CVE-2016-4072 https://access.redhat.com/security/cve/CVE-2016-4073 https://access.redhat.com/security/cve/CVE-2016-4342 https://access.redhat.com/security/cve/CVE-2016-4343 https://access.redhat.com/security/cve/CVE-2016-4473 https://access.redhat.com/security/cve/CVE-2016-4537 https://access.redhat.com/security/cve/CVE-2016-4538 https://access.redhat.com/security/cve/CVE-2016-4539 https://access.redhat.com/security/cve/CVE-2016-4540 https://access.redhat.com/security/cve/CVE-2016-4541 https://access.redhat.com/security/cve/CVE-2016-4542 https://access.redhat.com/security/cve/CVE-2016-4543 https://access.redhat.com/security/cve/CVE-2016-4544 https://access.redhat.com/security/cve/CVE-2016-5093 https://access.redhat.com/security/cve/CVE-2016-5094 https://access.redhat.com/security/cve/CVE-2016-5096 https://access.redhat.com/security/cve/CVE-2016-5114 https://access.redhat.com/security/cve/CVE-2016-5399 https://access.redhat.com/security/cve/CVE-2016-5766 https://access.redhat.com/security/cve/CVE-2016-5767 https://access.redhat.com/security/cve/CVE-2016-5768 https://access.redhat.com/security/cve/CVE-2016-5770 https://access.redhat.com/security/cve/CVE-2016-5771 https://access.redhat.com/security/cve/CVE-2016-5772 https://access.redhat.com/security/cve/CVE-2016-5773 https://access.redhat.com/security/cve/CVE-2016-6128 https://access.redhat.com/security/cve/CVE-2016-6207 https://access.redhat.com/security/cve/CVE-2016-6288 https://access.redhat.com/security/cve/CVE-2016-6289 https://access.redhat.com/security/cve/CVE-2016-6290 https://access.redhat.com/security/cve/CVE-2016-6291 https://access.redhat.com/security/cve/CVE-2016-6292 https://access.redhat.com/security/cve/CVE-2016-6294 https://access.redhat.com/security/cve/CVE-2016-6295 https://access.redhat.com/security/cve/CVE-2016-6296 https://access.redhat.com/security/cve/CVE-2016-6297 https://access.redhat.com/security/cve/CVE-2016-7124 https://access.redhat.com/security/cve/CVE-2016-7125 https://access.redhat.com/security/cve/CVE-2016-7126 https://access.redhat.com/security/cve/CVE-2016-7127 https://access.redhat.com/security/cve/CVE-2016-7128 https://access.redhat.com/security/cve/CVE-2016-7129 https://access.redhat.com/security/cve/CVE-2016-7130 https://access.redhat.com/security/cve/CVE-2016-7131 https://access.redhat.com/security/cve/CVE-2016-7132 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYKvj4XlSAg2UNWIIRAqg2AKCB6Jcysv4gkiktKAJA3gy+RKlAqwCeJpjs UCuj+0gWfBsWXOgFhgH0uL8= =FcPG -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05240731 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05240731 Version: 1 HPSBNS03635 rev.1 - HPE NonStop Servers OSS Script Languages running Perl and PHP, Multiple Local and Remote Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-08-19 Last Updated: 2016-08-19 Potential Security Impact: Local Denial of Service (DoS), Elevation of Privilege, Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Disclosure of Information, Unauthorized Modification Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Multiple potential remote and local vulnerabilities impacting Perl and PHP have been addressed by HPE NonStop Servers OSS Script Languages. The vulnerabilities include Perl's opportunistic loading of optional modules which might allow local users to gain elevation of privilege via a Trojan horse library under the current working directory. References: - CVE-2016-1238 - Perl Local Elevation of Privilege - CVE-2016-2381 - Perl Remote Unauthorized Modification - CVE-2014-4330 - Perl Local Denial of Service (DoS) **Note:** applies only for the H/J-series SPR. Fix was already provided in a previous L-series SPR. OSS Script Languages (T1203) T1203H01 through T1203H01^AAD, T1203L01 and T1203L01^AAC *Impacted releases:* - L15.02 - L15.08.00, L15.08.01 - L16.05.00 - J06.14 through J06.16.02 - J06.17.00, J06.17.01 - J06.18.00, J06.18.01 - J06.19.00, J06.19.01, J06.19.02 - J06.20.00 - H06.25 through H06.26.01 - H06.27.00, H06.27.01 - H06.28.00, H06.28.01 - H06.29.00, H06.29.01 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2013-7456 7.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2014-4330 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVE-2015-8383 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8386 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8387 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8389 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8390 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8391 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H 9.0 (AV:N/AC:L/Au:N/C:P/I:P/A:C) CVE-2015-8393 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2015-8394 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8607 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8853 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2015-8865 7.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-8874 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-1238 6.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H 6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C) CVE-2016-1903 9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P) CVE-2016-2381 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N) CVE-2016-2554 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2016-3074 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4070 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-4071 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4072 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4073 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4342 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C) CVE-2016-4343 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-4537 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4538 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4539 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4540 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4541 9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4542 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4543 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4544 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5093 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5094 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5096 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5114 9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P) CVE-2016-5766 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-5767 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-5768 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5769 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5770 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5771 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5772 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5773 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has released the following software updates to resolve the vulnerabilities in NonStop Servers OSS Script Languages running Perl and PHP. Install one of the SPRs below as appropriate for the system's release version: + L-Series: * T1203L01^AAE (OSS Scripting Languages) - already available This SPR already is present in these RVUs: None This SPR is usable with the following RVUs: - L15.02 through L16.05.00 + H and J-Series: * T1203H01^AAF (OSS Scripting Languages) - already available This SPR already is present in these RVUs: None This SPR is usable with the following RVUs: - J06.14 through J06.20.00 - H06.25 through H06.29.01 **Note:** Please refer to *NonStop Hotstuff HS03333* for more information. HISTORY Version:1 (rev.1) - 19 August 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003 OS X El Capitan 10.11.5 and Security Update 2016-003 is now available and addresses the following: AMD Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1792 : beist and ABH of BoB AMD Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: An application may be able to determine kernel memory layout Description: An issue existed that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2016-1791 : daybreaker of Minionz apache_mod_php Available for: OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.34. These were addressed by updating PHP to version 5.5.34. CVE-ID CVE-2015-8865 CVE-2016-3141 CVE-2016-3142 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072 CVE-2016-4073 AppleGraphicsControl Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1793 : Ian Beer of Google Project Zero CVE-2016-1794 : Ian Beer of Google Project Zero AppleGraphicsPowerManagement Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1795 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro ATS Available for: OS X El Capitan v10.11 and later Impact: An application may be able to determine kernel memory layout Description: An out of bounds memory access issue was addressed through improved memory handling. CVE-ID CVE-2016-1796 : lokihardt working with Trend Micro's Zero Day Initiative ATS Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with system privileges Description: An issue existed in the sandbox policy. This was addressed by sandboxing FontValidator. CVE-ID CVE-2016-1797 : lokihardt working with Trend Micro's Zero Day Initiative Audio Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later Impact: An application may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1798 : Juwei Lin of TrendMicro Audio Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1799 : Juwei Lin of TrendMicro Captive Network Assistant Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to execute arbitrary code with user assistance Description: A custom URL scheme handling issue was addressed through improved input validation. CVE-ID CVE-2016-1800 : Apple CFNetwork Proxies Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: An information leak existed in the handling of HTTP and HTTPS requests. This issue was addressed through improved URL handling. CVE-ID CVE-2016-1801 : Alex Chapman and Paul Stone of Context Information Security CommonCrypto Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to leak sensitive user information Description: An issue existed in the handling of return values in CCCrypt. This issue was addressed through improved key length management. CVE-ID CVE-2016-1802 : Klaus Rodewig CoreCapture Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1803 : Ian Beer of Google Project Zero, daybreaker working with Trend Micro’s Zero Day Initiative CoreStorage Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A configuration issue was addressed through additional restrictions. CVE-ID CVE-2016-1805 : Stefan Esser Crash Reporter Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with root privileges Description: A configuration issue was addressed through additional restrictions. CVE-ID CVE-2016-1806 : lokihardt working with Trend Micro's Zero Day Initiative Disk Images Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to read kernel memory Description: A race condition was addressed through improved locking. CVE-ID CVE-2016-1807 : Ian Beer of Google Project Zero Disk Images Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2016-1808 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro Disk Utility Available for: OS X El Capitan v10.11 and later Impact: Disk Utility failed to compress and encrypt disk images Description: Incorrect keys were being used to encrypt disk images. This issue was addressed by updating the encryption keys. CVE-ID CVE-2016-1809 : Ast A. Moore (@astamoore) and David Foster of TechSmartKids Graphics Drivers Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1810 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro ImageIO Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted image may lead to a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1811 : Lander Brandt (@landaire) Intel Graphics Driver Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed through improved bounds checking. CVE-ID CVE-2016-1812 : Juwei Lin of TrendMicro IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to cause a denial of service Description: A null pointer dereference was addressed through improved locking. CVE-ID CVE-2016-1814 : Juwei Lin of TrendMicro IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1815 : Liang Chen, Qidan He of KeenLab, Tencent working with Trend Micro's Zero Day Initiative CVE-2016-1817 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro working with Trend Micro's Zero Day Initiative CVE-2016-1818 : Juwei Lin of TrendMicro CVE-2016-1819 : Ian Beer of Google Project Zero IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1813 : Ian Beer of Google Project Zero CVE-2016-1816 : Peter Pi (@heisecode) of Trend Micro and Juwei Lin of Trend Micro IOAudioFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-ID CVE-2016-1820 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro working with Trend Micro’s Zero Day Initiative IOAudioFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1821 : Ian Beer of Google Project Zero IOFireWireFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1822 : CESG IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1823 : Ian Beer of Google Project Zero CVE-2016-1824 : Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1825 : Brandon Azad Kernel Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1827 : Brandon Azad CVE-2016-1828 : Brandon Azad CVE-2016-1829 : CESG CVE-2016-1830 : Brandon Azad CVE-2016-1831 : Brandon Azad Kernel Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: An integer overflow existed in dtrace. This issue was addressed through improved bounds checking. CVE-ID CVE-2016-1826 : Ben Murphy working with Trend Micro’s Zero Day Initiative libc Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1832 : Karl Williamson libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1833 : Mateusz Jurczyk CVE-2016-1834 : Apple CVE-2016-1835 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1837 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1838 : Mateusz Jurczyk CVE-2016-1839 : Mateusz Jurczyk CVE-2016-1840 : Kostya Serebryany libxslt Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1841 : Sebastian Apelt MapKit Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: Shared links were sent with HTTP rather than HTTPS. This was addressed by enabling HTTPS for shared links. CVE-ID CVE-2016-1842 : Richard Shupak (https://www.linkedin.com/in/rshupak) Messages Available for: OS X El Capitan v10.11 and later Impact: A malicious server or user may be able to modify another user's contact list Description: A validation issue existed in roster changes. This issue was addressed through improved validation of roster sets. CVE-ID CVE-2016-1844 : Thijs Alkemade of Computest Messages Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to leak sensitive user information Description: An encoding issue existed in filename parsing. This issue was addressed through improved filename encoding. CVE-ID CVE-2016-1843 : Heige (a.k.a. SuperHei) of Knownsec 404 Security Team [http://www.knownsec.com] Multi-Touch Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1804 : Liang Chen, Yubin Fu, Marco Grassi of KeenLab, Tencent of Trend Micro's Zero Day Initiative NVIDIA Graphics Drivers Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1846 : Ian Beer of Google Project Zero OpenGL Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1847 : Tongbo Luo and Bo Qu of Palo Alto Networks QuickTime Available for: OS X El Capitan v10.11 and later Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1848 : Francis Provencher from COSIG SceneKit Available for: OS X El Capitan v10.11 and later Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1850 : Tyler Bohan of Cisco Talos Screen Lock Available for: OS X El Capitan v10.11 and later Impact: A person with physical access to a computer may be able to reset an expired password from the lock screen Description: An issue existed in the management of password profiles. This issue was addressed through improved password reset handling. CVE-ID CVE-2016-1851 : an anonymous researcher Tcl Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: A protocol security issue was addressed by disabling SSLv2. CVE-ID CVE-2016-1853 : researchers at Tel Aviv University, Münster University of Applied Sciences, Ruhr University Bochum, the University of Pennsylvania, the Hashcat project, the University of Michigan, Two Sigma, Google, and the OpenSSL project: Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt Note: OS X El Capitan 10.11.5 includes the security content of Safari 9.1.1. For further details see https://support.apple.com/en-us/HT206565 OS X El Capitan 10.11.5 and Security Update 2016-003 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJXOj0GAAoJEIOj74w0bLRGFp0QANQktsdXgOptLJWGqWXaDKmW HaY0fNyuXNLzGNH2GKQ1yXi2KjMqGnCuAwaS3Ku/4qx2Imq3X+BLLYrSOwttbAvQ yGdWaFo1ExK/WT4CI02QM7LDOZNXOyZq/ofQ4jXi/wDpuXXNV+I+RsMMUJL4Uon9 2fngj7FHXk4fvCYs9lahjv+wDGkpIcVDTU6Liqxmje2KQzShYJ8tYwwacsOSQKxk bmsUiA9q9zkGbbo7mo5WikQUO1XWaBLQiBejzJMyNEFGECtOc9B4+irTJgERTSHb igd2875EmH/sNI6WkEQNZwpMfdKBhNI/W9e/DhZVSwAydK6xt8yr0vd5ZF/M8jCU CWGzoOQI1snlr862Ccx7H+db8umu1UmDMUjz1To+hqCEhnvMW2/oRvrKtk2Q65Pu STqixhDl0HEamvX/72r7LNsZHjzmoGoKjpwjnGf0phZgSBP1bWKmhp9748Rcb12a LzwRy7KJ20W8XGGiMeqKoe4bFaBK6iBJok4+ZpROadGrxtjVumtqbZ5CrY1Hp8/F I4VMuReDqG39G4yyDeAEr9JWRdmV285Z1zaxOgd2CsPblDfEWp9HiBpC8Agd1p9x Mf/EDssinL1K7dQQPIXgGUE5S6Z2DzGEeKvHzm8kLxl0OfwntATY/mf7TM0nj4JY YyNMZcKPuYVmF3b2PAfb =P+17 -----END PGP SIGNATURE----- . Background ========== file is a utility that guesses a file format by scanning binary data for patterns. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201611-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: PHP: Multiple vulnerabilities Date: November 30, 2016 Bugs: #578734, #581834, #584204, #587246, #591710, #594498, #597586, #599326 ID: 201611-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution or cause a Denial of Service condition. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.28" References ========== [ 1 ] CVE-2015-8865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865 [ 2 ] CVE-2016-3074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074 [ 3 ] CVE-2016-4071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071 [ 4 ] CVE-2016-4072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072 [ 5 ] CVE-2016-4073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073 [ 6 ] CVE-2016-4537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537 [ 7 ] CVE-2016-4538 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538 [ 8 ] CVE-2016-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539 [ 9 ] CVE-2016-4540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540 [ 10 ] CVE-2016-4541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541 [ 11 ] CVE-2016-4542 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542 [ 12 ] CVE-2016-4543 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543 [ 13 ] CVE-2016-4544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544 [ 14 ] CVE-2016-5385 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385 [ 15 ] CVE-2016-6289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289 [ 16 ] CVE-2016-6290 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290 [ 17 ] CVE-2016-6291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291 [ 18 ] CVE-2016-6292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292 [ 19 ] CVE-2016-6294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294 [ 20 ] CVE-2016-6295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295 [ 21 ] CVE-2016-6296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296 [ 22 ] CVE-2016-6297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297 [ 23 ] CVE-2016-7124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124 [ 24 ] CVE-2016-7125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125 [ 25 ] CVE-2016-7126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126 [ 26 ] CVE-2016-7127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127 [ 27 ] CVE-2016-7128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128 [ 28 ] CVE-2016-7129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129 [ 29 ] CVE-2016-7130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130 [ 30 ] CVE-2016-7131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131 [ 31 ] CVE-2016-7132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132 [ 32 ] CVE-2016-7133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133 [ 33 ] CVE-2016-7134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134 [ 34 ] CVE-2016-7411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411 [ 35 ] CVE-2016-7412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412 [ 36 ] CVE-2016-7413 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413 [ 37 ] CVE-2016-7414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414 [ 38 ] CVE-2016-7416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416 [ 39 ] CVE-2016-7417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417 [ 40 ] CVE-2016-7418 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201611-22 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.7

sources: NVD: CVE-2015-8865 // JVNDB: JVNDB-2015-007175 // BID: 85802 // VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // PACKETSTORM: 137174 // PACKETSTORM: 148367 // PACKETSTORM: 139729 // PACKETSTORM: 138463 // PACKETSTORM: 137086 // PACKETSTORM: 140540 // PACKETSTORM: 139968

AFFECTED PRODUCTS

vendor:phpmodel:phpscope:eqversion:7.0.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.19

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.18

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.17

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.13

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.12

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.11

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.5

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.4

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.4

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.9

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.8

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.7

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.6

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.14

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.10

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.11.4

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.6.15

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.6.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.6.16

Trust: 1.0

vendor:phpmodel:phpscope:lteversion:5.5.33

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11 and later

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:7.0.5

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.6.x

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:7.x

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:5.6.20

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.11.4

Trust: 0.6

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:15.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:7.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.33

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.32

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.45

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.44

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.43

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.37

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.30

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.20

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.31

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.30

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.42

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.41

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.39

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.38

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.36

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.35

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.34

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.33

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.32

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.31

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.20

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17.03

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.43

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os security updatescope:eqversion:x2016-0020

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:phpmodel:phpscope:neversion:7.0.5

Trust: 0.3

vendor:phpmodel:phpscope:neversion:5.6.20

Trust: 0.3

vendor:phpmodel:phpscope:neversion:5.5.34

Trust: 0.3

vendor:applemodel:mac os security updatescope:neversion:x2016-0030

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.11.5

Trust: 0.3

sources: BID: 85802 // JVNDB: JVNDB-2015-007175 // CNNVD: CNNVD-201604-556 // NVD: CVE-2015-8865

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-8865
value: HIGH

Trust: 1.0

NVD: CVE-2015-8865
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201604-556
value: HIGH

Trust: 0.6

VULHUB: VHN-86826
value: HIGH

Trust: 0.1

VULMON: CVE-2015-8865
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-8865
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-86826
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-8865
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // JVNDB: JVNDB-2015-007175 // CNNVD: CNNVD-201604-556 // NVD: CVE-2015-8865

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-86826 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 137174 // PACKETSTORM: 140540 // CNNVD: CNNVD-201604-556

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201604-556

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007175

PATCH

title:APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003url:http://lists.apple.com/archives/security-announce/2016/May/msg00004.html

Trust: 0.8

title:HT206567url:https://support.apple.com/en-us/HT206567

Trust: 0.8

title:HT206567url:https://support.apple.com/ja-jp/HT206567

Trust: 0.8

title:PR/454: Fix memory corruption when the continuation level jumps by more thanurl:https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36

Trust: 0.8

title:0000522: Buffer over-write in PHP function finfo_open with malformed magic file. (uses libmagic)url:http://bugs.gw.com/view.php?id=522

Trust: 0.8

title:Sec Bug #71527url:https://bugs.php.net/bug.php?id=71527

Trust: 0.8

title:PHP 5 ChangeLogurl:http://php.net/ChangeLog-5.php

Trust: 0.8

title:PHP 7 ChangeLogurl:http://php.net/ChangeLog-7.php

Trust: 0.8

title:Fixed bug #71527 Buffer over-write in finfo_open with malformed magic fileurl:http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 0.8

title:PHP Fileinfo Fixes for component buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61239

Trust: 0.6

title:Debian CVElist Bug Report Logs: file: CVE-2015-8865: file_check_mem() misbehaves on some inputurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=357578556d837956c999174963fd2eea

Trust: 0.1

title:Ubuntu Security Notice: file vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3686-2

Trust: 0.1

title:Red Hat: CVE-2015-8865url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-8865

Trust: 0.1

title:Ubuntu Security Notice: file vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3686-1

Trust: 0.1

title:Debian Security Advisories: DSA-3560-1 php5 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9f33dfec360e1186a6d0f52314de3ce6

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-698url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-698

Trust: 0.1

title:Ubuntu Security Notice: php5, php7.0 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2984-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: hhvm: Various CVEs (CVE-2014-9709 CVE-2015-8865 CVE-2016-1903 CVE-2016-4070 CVE-2016-4539 CVE-2016-6870 CVE-2016-6871 CVE-2016-6872 CVE-2016-6873 CVE-2016-6874 CVE-2016-6875)url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=98d16dc1a3e1824eeb9ad5c28e1a0a02

Trust: 0.1

title:Red Hat: Moderate: rh-php56 security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162750 - Security Advisory

Trust: 0.1

title:Apple: OS X El Capitan v10.11.5 and Security Update 2016-003url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=3c550201b398ce302f3a9adf27215fda

Trust: 0.1

sources: VULMON: CVE-2015-8865 // JVNDB: JVNDB-2015-007175 // CNNVD: CNNVD-201604-556

EXTERNAL IDS

db:NVDid:CVE-2015-8865

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2016/04/24/1

Trust: 1.8

db:BIDid:85802

Trust: 1.5

db:JVNDBid:JVNDB-2015-007175

Trust: 0.8

db:CNNVDid:CNNVD-201604-556

Trust: 0.7

db:PACKETSTORMid:148367

Trust: 0.2

db:PACKETSTORMid:139968

Trust: 0.2

db:PACKETSTORMid:137174

Trust: 0.2

db:PACKETSTORMid:137086

Trust: 0.2

db:PACKETSTORMid:136841

Trust: 0.1

db:VULHUBid:VHN-86826

Trust: 0.1

db:VULMONid:CVE-2015-8865

Trust: 0.1

db:PACKETSTORMid:139729

Trust: 0.1

db:PACKETSTORMid:138463

Trust: 0.1

db:PACKETSTORMid:140540

Trust: 0.1

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // BID: 85802 // JVNDB: JVNDB-2015-007175 // PACKETSTORM: 137174 // PACKETSTORM: 148367 // PACKETSTORM: 139729 // PACKETSTORM: 138463 // PACKETSTORM: 137086 // PACKETSTORM: 140540 // PACKETSTORM: 139968 // CNNVD: CNNVD-201604-556 // NVD: CVE-2015-8865

REFERENCES

url:https://bugs.php.net/bug.php?id=71527

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2016/may/msg00004.html

Trust: 1.8

url:http://bugs.gw.com/view.php?id=522

Trust: 1.8

url:http://www.php.net/changelog-5.php

Trust: 1.8

url:http://www.php.net/changelog-7.php

Trust: 1.8

url:https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36

Trust: 1.8

url:https://support.apple.com/ht206567

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2016/04/24/1

Trust: 1.8

url:https://security.gentoo.org/glsa/201611-22

Trust: 1.3

url:https://security.gentoo.org/glsa/201701-42

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2016-2750.html

Trust: 1.3

url:https://usn.ubuntu.com/3686-2/

Trust: 1.3

url:http://www.securityfocus.com/bid/85802

Trust: 1.2

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05240731

Trust: 1.2

url:http://www.debian.org/security/2016/dsa-3560

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2952-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2952-2

Trust: 1.2

url:https://usn.ubuntu.com/3686-1/

Trust: 1.2

url:http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 1.1

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8865

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8865

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-8865

Trust: 0.7

url:http://php.net/changelog-5.php

Trust: 0.3

url:http://php.net/changelog-7.php

Trust: 0.3

url:http://www.php.net/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4537

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4538

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4072

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4071

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4073

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4539

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4542

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4070

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4544

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4343

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4543

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4342

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8386

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-7456

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1903

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8383

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8874

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-3074

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8865

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-osx-apachemodphp-cve-2015-8865

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827377

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3132

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php7.0/7.0.4-7ubuntu2.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3078

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.17

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-2984-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/php5/5.6.11+dfsg-1ubuntu3.4

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3686-1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3686-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10360

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8395

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6288

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6290

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3217

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8381

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4541

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5093

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8383

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2326

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5094

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8392

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6207

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2325

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8395

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4343

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7132

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4072

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6294

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5114

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8866

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4538

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8385

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2327

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6291

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8384

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4342

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8392

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5773

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3210

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7124

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5767

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9767

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2013-7456

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7128

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8385

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8386

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6297

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5073

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7126

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8388

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5399

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5073

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6295

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4544

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2327

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3217

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2325

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6289

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-6296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4473

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8874

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5770

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9767

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2328

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4542

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5768

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8866

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5096

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4071

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8381

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7127

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4070

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3142

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3210

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7131

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2328

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8853

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05240731

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8393

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1238

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2381

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8387

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2554

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8389

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1795

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1799

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1814

Trust: 0.1

url:http://www.knownsec.com]

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1798

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1804

Trust: 0.1

url:https://www.linkedin.com/in/rshupak)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1793

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1800

Trust: 0.1

url:https://support.apple.com/en-us/ht206565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1794

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1810

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1813

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1796

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1812

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1792

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3710

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9653

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3710

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7131

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7417

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7129

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4538

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6292

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7416

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5385

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6295

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5385

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7134

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7411

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4537

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7413

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6292

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7414

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7126

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6295

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6294

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4543

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7129

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7412

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7418

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3074

Trust: 0.1

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // BID: 85802 // JVNDB: JVNDB-2015-007175 // PACKETSTORM: 137174 // PACKETSTORM: 148367 // PACKETSTORM: 139729 // PACKETSTORM: 138463 // PACKETSTORM: 137086 // PACKETSTORM: 140540 // PACKETSTORM: 139968 // CNNVD: CNNVD-201604-556 // NVD: CVE-2015-8865

CREDITS

Hugh Davenport

Trust: 0.3

sources: BID: 85802

SOURCES

db:VULHUBid:VHN-86826
db:VULMONid:CVE-2015-8865
db:BIDid:85802
db:JVNDBid:JVNDB-2015-007175
db:PACKETSTORMid:137174
db:PACKETSTORMid:148367
db:PACKETSTORMid:139729
db:PACKETSTORMid:138463
db:PACKETSTORMid:137086
db:PACKETSTORMid:140540
db:PACKETSTORMid:139968
db:CNNVDid:CNNVD-201604-556
db:NVDid:CVE-2015-8865

LAST UPDATE DATE

2024-11-21T21:17:35.966000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-86826date:2018-06-30T00:00:00
db:VULMONid:CVE-2015-8865date:2018-06-30T00:00:00
db:BIDid:85802date:2017-01-23T09:11:00
db:JVNDBid:JVNDB-2015-007175date:2016-05-25T00:00:00
db:CNNVDid:CNNVD-201604-556date:2016-05-23T00:00:00
db:NVDid:CVE-2015-8865date:2023-11-07T02:28:44.817

SOURCES RELEASE DATE

db:VULHUBid:VHN-86826date:2016-05-20T00:00:00
db:VULMONid:CVE-2015-8865date:2016-05-20T00:00:00
db:BIDid:85802date:2016-04-02T00:00:00
db:JVNDBid:JVNDB-2015-007175date:2016-05-25T00:00:00
db:PACKETSTORMid:137174date:2016-05-24T23:31:17
db:PACKETSTORMid:148367date:2018-06-29T00:19:16
db:PACKETSTORMid:139729date:2016-11-15T16:44:45
db:PACKETSTORMid:138463date:2016-08-22T18:18:17
db:PACKETSTORMid:137086date:2016-05-17T16:06:24
db:PACKETSTORMid:140540date:2017-01-17T15:34:19
db:PACKETSTORMid:139968date:2016-12-01T16:38:01
db:CNNVDid:CNNVD-201604-556date:2016-04-25T00:00:00
db:NVDid:CVE-2015-8865date:2016-05-20T10:59:00.137