|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for php RHSA-2017:3221-01|
|Summary:||The remote host is missing an update for the 'php'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'php'
package(s) announced via the referenced advisory.
PHP is an HTML-embedded scripting language
commonly used with the Apache HTTP Server.
* A null pointer dereference flaw was found in libgd. An attacker could use
a specially-crafted .gd2 file to cause an application linked with libgd to
crash, leading to denial of service. (CVE-2016-10167)
* An integer overflow flaw, leading to a heap-based buffer overflow was
found in the way libgd read some specially-crafted gd2 files. A remote
attacker could use this flaw to crash an application compiled with libgd or
in certain cases execute arbitrary code with the privileges of the user
running that application. (CVE-2016-10168)
php on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-10167|
Common Vulnerability Exposure (CVE) ID: CVE-2016-10168
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.