[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-602 --- php55

ID: oval:org.secpod.oval:def:1200156Date: (C)2016-01-04   (M)2024-04-17
Class: PATCHFamily: unix




As reported upstream, A NULL pointer dereference flaw was found in the way PHP"s Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash. Use after free vulnerability was found in unserialize function. We can create ZVAL and free it via Serializable::unserialize. However the unserialize will still allow to use R: or r: to set references to that already freed memory. It is possible to use-after-free attack and execute arbitrary code remotely. A use-after-free vulnerability was found in session deserializer. When session deserializer is deserializing multiple data, it will call php_var_unserialize multiple times. We can create ZVAL and free it via the php_var_unserialize with a crafted serialized string. Then the next call php_var_unserialize will still allow to use R: or r: to set references to that already freed memory. It is possible to use-after-free attack and execute arbitrary code remotely. As reported upstream, an uninitialized pointer use flaw was found in the phar_make_dirstream function of PHP"s Phar extension. A specially crafted phar file in the ZIP format with a directory entry with a file name "/ZIP" could cause a PHP application function to crash

Platform:
Amazon Linux AMI
Product:
php55
Reference:
ALAS-2015-602
CVE-2015-7804
CVE-2015-7803
CVE-2015-6838
CVE-2015-6837
CVE-2015-6836
CVE-2015-6835
CVE-2015-6834
CVE    7
CVE-2015-6834
CVE-2015-6835
CVE-2015-6836
CVE-2015-7804
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:php:php55

© SecPod Technologies