Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842772
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2984-1)
Summary:The remote host is missing an update for the 'php5, php7.0' package(s) announced via the USN-2984-1 advisory.
Description:Summary:
The remote host is missing an update for the 'php5, php7.0' package(s) announced via the USN-2984-1 advisory.

Vulnerability Insight:
It was discovered that the PHP Fileinfo component incorrectly handled
certain magic files. An attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865)

Hans Jerry Illikainen discovered that the PHP Zip extension incorrectly
handled certain malformed Zip archives. A remote attacker could use this
issue to cause PHP to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS.
(CVE-2016-3078)

It was discovered that PHP incorrectly handled invalid indexes in the
SplDoublyLinkedList class. An attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132)

It was discovered that the PHP rawurlencode() function incorrectly handled
large strings. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
16.04 LTS. (CVE-2016-4070)

It was discovered that the PHP php_snmp_error() function incorrectly
handled string formatting. A remote attacker could use this issue to cause
PHP to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071)

It was discovered that the PHP phar extension incorrectly handled certain
filenames in archives. A remote attacker could use this issue to cause PHP
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4072)

It was discovered that the PHP mb_strcut() function incorrectly handled
string formatting. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073)

It was discovered that the PHP phar extension incorrectly handled certain
archive files. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and
Ubuntu 15.10. (CVE-2016-4342, CVE-2016-4343)

It was discovered that the PHP bcpowmod() function incorrectly handled
memory. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-4537, CVE-2016-4538)

It was discovered that the PHP XML parser incorrectly handled certain
malformed XML data. A remote attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-4539)

It was discovered that certain PHP grapheme functions incorrectly handled
negative offsets. A remote attacker could possibly use ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'php5, php7.0' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.10, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-8865
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
BugTraq ID: 85802
http://www.securityfocus.com/bid/85802
Debian Security Information: DSA-3560 (Google Search)
http://www.debian.org/security/2016/dsa-3560
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
http://www.openwall.com/lists/oss-security/2016/04/24/1
RedHat Security Advisories: RHSA-2016:2750
http://rhn.redhat.com/errata/RHSA-2016-2750.html
SuSE Security Announcement: openSUSE-SU-2016:1167 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
Common Vulnerability Exposure (CVE) ID: CVE-2016-3078
1035701
http://www.securitytracker.com/id/1035701
39742
https://www.exploit-db.com/exploits/39742/
[oss-security] 20160428 CVE-2016-3078: php: integer overflow in ZipArchive::getFrom*
http://www.openwall.com/lists/oss-security/2016/04/28/1
https://bugs.php.net/bug.php?id=71923
https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c?w=1
https://php.net/ChangeLog-7.php
https://security-tracker.debian.org/tracker/CVE-2016-3078
Common Vulnerability Exposure (CVE) ID: CVE-2016-3132
BugTraq ID: 92356
http://www.securityfocus.com/bid/92356
Common Vulnerability Exposure (CVE) ID: CVE-2016-4070
BugTraq ID: 85801
http://www.securityfocus.com/bid/85801
SuSE Security Announcement: SUSE-SU-2016:1277 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
SuSE Security Announcement: openSUSE-SU-2016:1274 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
SuSE Security Announcement: openSUSE-SU-2016:1373 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4071
BugTraq ID: 85800
http://www.securityfocus.com/bid/85800
https://www.exploit-db.com/exploits/39645/
Common Vulnerability Exposure (CVE) ID: CVE-2016-4072
BugTraq ID: 85993
http://www.securityfocus.com/bid/85993
Common Vulnerability Exposure (CVE) ID: CVE-2016-4073
BugTraq ID: 85991
http://www.securityfocus.com/bid/85991
Common Vulnerability Exposure (CVE) ID: CVE-2016-4342
BugTraq ID: 89154
http://www.securityfocus.com/bid/89154
http://www.openwall.com/lists/oss-security/2016/04/28/2
SuSE Security Announcement: openSUSE-SU-2016:1357 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
SuSE Security Announcement: openSUSE-SU-2016:1524 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4343
BugTraq ID: 89179
http://www.securityfocus.com/bid/89179
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
Common Vulnerability Exposure (CVE) ID: CVE-2016-4537
BugTraq ID: 90173
http://www.securityfocus.com/bid/90173
Debian Security Information: DSA-3602 (Google Search)
http://www.debian.org/security/2016/dsa-3602
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://www.openwall.com/lists/oss-security/2016/05/05/21
Common Vulnerability Exposure (CVE) ID: CVE-2016-4538
Common Vulnerability Exposure (CVE) ID: CVE-2016-4539
BugTraq ID: 90174
http://www.securityfocus.com/bid/90174
Common Vulnerability Exposure (CVE) ID: CVE-2016-4540
BugTraq ID: 90172
http://www.securityfocus.com/bid/90172
Common Vulnerability Exposure (CVE) ID: CVE-2016-4541
Common Vulnerability Exposure (CVE) ID: CVE-2016-4542
BugTraq ID: 89844
http://www.securityfocus.com/bid/89844
Common Vulnerability Exposure (CVE) ID: CVE-2016-4543
Common Vulnerability Exposure (CVE) ID: CVE-2016-4544
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.