Bug 42987 - php5: Multiple issues (4.1)
php5: Multiple issues (4.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.1
Other Linux
: P5 normal (vote)
: UCS 4.1-4-errata
Assigned To: Arvid Requate
Janek Walkenhorst
:
Depends on: 40918
Blocks: 43551
  Show dependency treegraph
 
Reported: 2016-11-17 18:43 CET by Arvid Requate
Modified: 2017-05-03 15:37 CEST (History)
5 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2016-11-17 18:43:06 CET
+++ This bug was initially created as a clone of Bug #40918 +++

The following issue have been reported as fixed in the Debian jessie PHP version 5.6, they might affect 5.4 too:

CVE-2016-3141 CVE-2016-3142 CVE-2015-4116
CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127
CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131
CVE-2016-7132 CVE-2016-7411 CVE-2016-7412 CVE-2016-7413
CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418
Comment 1 Arvid Requate univentionstaff 2016-12-15 15:55:49 CET
Additional issues reported as fixed in Jessie:

* Issues from Upstream bug #73147 still unfixed in 5.6.27 and 7.0.12 (CVE-2016-9138)
* imagefilltoborder stackoverflow on truecolor images (CVE-2016-9933)
* NULL Pointer Dereference in WDDX Packet Deserialization with PDORow (CVE-2016-9934)
Comment 2 Arvid Requate univentionstaff 2016-12-19 17:51:53 CET
Upstream Debian package version 5.4.45-0+deb7u6 fixes these issues:

CVE-2016-5385
      PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18
      namespace conflicts and therefore does not protect applications from
      the presence of untrusted client data in the HTTP_PROXY environment
      variable, which might allow remote attackers to redirect an application's
      outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy
      header in an HTTP request, as demonstrated by (1) an application that
      makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP,
      aka an "httpoxy" issue.

CVE-2016-7124
      ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10
      mishandles certain invalid objects, which allows remote attackers to cause
      a denial of service or possibly have unspecified other impact via crafted
      serialized data that leads to a (1) __destruct call or (2) magic method
      call.

CVE-2016-7128
      The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before
      5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset
      that exceeds the file size, which allows remote attackers to obtain
      sensitive information from process memory via a crafted TIFF image.

CVE-2016-7129
      The php_wddx_process_data function in ext/wddx/wddx.c in PHP before
      5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial
      of service (segmentation fault) or possibly have unspecified other
      impact via an invalid ISO 8601 time value, as demonstrated by
      a wddx_deserialize call that mishandles a dateTime element in
      a wddxPacket XML document.

CVE-2016-7130
      The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before
      5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a
      denial of service (NULL pointer dereference and application crash)
      or possibly have unspecified other impact via an invalid base64
      binary value, as demonstrated by a wddx_deserialize call that
      mishandles a binary element in a wddxPacket XML document.

CVE-2016-7131
      ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
      remote attackers to cause a denial of service (NULL pointer
      dereference and application crash) or possibly have unspecified
      other impact via a malformed wddxPacket XML document that is
      mishandled in a wddx_deserialize call, as demonstrated by a tag
      that lacks a < (less than) character.

CVE-2016-7132
      ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
      remote attackers to cause a denial of service (NULL pointer
      dereference and application crash) or possibly have unspecified
      other impact via an invalid wddxPacket XML document that is
      mishandled in a wddx_deserialize call, as demonstrated by
      a stray element inside a boolean element, leading to incorrect
      pop processing.

CVE-2016-7411
      ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles
      object-deserialization failures, which allows remote attackers
      to cause a denial of service (memory corruption) or possibly
      have unspecified other impact via an unserialize call that
      references a partially constructed object.

CVE-2016-7412
      ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x
      before 7.0.11 does not verify that a BIT field has the
      UNSIGNED_FLAG flag, which allows remote MySQL servers to cause
      a denial of service (heap-based buffer overflow) or possibly
      have unspecified other impact via crafted field metadata.

CVE-2016-7413
      Use-after-free vulnerability in the wddx_stack_destroy function in
      ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows
      remote attackers to cause a denial of service or possibly have
      unspecified other impact via a wddxPacket XML document that lacks
      an end-tag for a recordset field element, leading to mishandling
      in a wddx_deserialize call.

CVE-2016-7414
      The ZIP signature-verification feature in PHP before 5.6.26 and 7.x
      before 7.0.11 does not ensure that the uncompressed_filesize field
      is large enough, which allows remote attackers to cause a denial of
      service (out-of-bounds memory access) or possibly have unspecified
      other impact via a crafted PHAR archive, related to ext/phar/util.c
      and ext/phar/zip.c.

CVE-2016-7416
      ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x
      before 7.0.11 does not properly restrict the locale length provided
      to the Locale class in the ICU library, which allows remote attackers
      to cause a denial of service (application crash) or possibly have
      unspecified other impact via a MessageFormatter::formatMessage call
      with a long first argument.

CVE-2016-7417
      ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11
      proceeds with SplArray unserialization without validating a
      return value and data type, which allows remote attackers to
      cause a denial of service or possibly have unspecified other
      impact via crafted serialized data.

CVE-2016-7418
      The php_wddx_push_element function in ext/wddx/wddx.c in PHP before
      5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a
      denial of service (invalid pointer access and out-of-bounds read)
      or possibly have unspecified other impact via an incorrect boolean
      element in a wddxPacket XML document, leading to mishandling in
      a wddx_deserialize call.
Comment 3 Arvid Requate univentionstaff 2017-02-15 19:37:24 CET
Upstream Debian package version 5.4.45-0+deb7u7 additionally fixes:

* The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. (CVE-2016-10158)
* Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive. (CVE-2016-10159)
* Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. (CVE-2016-10160)
* The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. (CVE-2016-10161)
* ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive. (CVE-2016-4342)
Comment 4 Arvid Requate univentionstaff 2017-02-15 19:46:01 CET
Upstream Debian package version 5.4.45-0+deb7u7 also fixes:

* Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, ... (CVE-2016-2554)

* Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element (CVE-2016-3141)

* The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location (CVE-2016-3142)

* ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string (CVE-2016-9934)

* The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document (CVE-2016-9935)
Comment 5 Arvid Requate univentionstaff 2017-02-15 21:35:44 CET
Imported and built.

Advisory: php5.yaml
Comment 6 Arvid Requate univentionstaff 2017-04-19 18:41:13 CEST
Upstream Debian package version 5.4.45-0+deb7u8 additionally fixes:

* Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876. (CVE-2016-7478)

* PHP through 7.1.3 enables potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. (CVE-2017-7272)

Package updated and rebuilt.
Comment 7 Janek Walkenhorst univentionstaff 2017-04-27 19:05:51 CEST
Advisory: OK
Tests (amd64): OK
Comment 8 Janek Walkenhorst univentionstaff 2017-05-03 15:37:10 CEST
<http://errata.software-univention.de/ucs/4.1/413.html>