[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-393 ---- php

ID: oval:org.secpod.oval:def:1600089Date: (C)2016-01-19   (M)2023-12-07
Class: PATCHFamily: unix




A denial of service flaw was found in the way the File Information extension parsed certain Composite Document Format files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file.acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file. A buffer over-read flaw was found in the way the DateInterval class parsed interval specifications. An attacker able to make a PHP application parse a specially crafted specification using DateInterval could possibly cause the PHP interpreter to crash. A heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT records. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record function to perform a DNS query. A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes" unserialize method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application.

Platform:
Amazon Linux AMI
Product:
php
Reference:
ALAS-2014-393
CVE-2014-0237
CVE-2014-3981
CVE-2013-6712
CVE-2014-4049
CVE-2014-0207
CVE-2014-3515
CVE-2014-0238
CVE    7
CVE-2014-0238
CVE-2014-0237
CVE-2014-0207
CVE-2014-3981
...
CPE    138
cpe:/a:php:php:5.0.0:rc3
cpe:/a:php:php:5.4.23
cpe:/a:php:php:5.0.0:rc2
cpe:/a:php:php:5.4.24
...

© SecPod Technologies