![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.2.2016.499 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-499-1) |
Summary: | The remote host is missing an update for the Debian 'php5' package(s) announced via the DLA-499-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'php5' package(s) announced via the DLA-499-1 advisory. Vulnerability Insight: CVE-2015-8865 The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. CVE-2015-8866 libxml_disable_entity_loader setting is shared between threads ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161. CVE-2015-8878 main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses. CVE-2015-8879 The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table. CVE-2016-4070 Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. CVE-2016-4071 Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call. CVE-2016-4072 The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of 0 characters by the phar_analyze_path function in ext/phar/phar.c. CVE-2016-4073 Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call. CVE-2016-4343 The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive. CVE-2016-4537 The ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'php5' package(s) on Debian 7. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-8865 http://lists.apple.com/archives/security-announce/2016/May/msg00004.html BugTraq ID: 85802 http://www.securityfocus.com/bid/85802 Debian Security Information: DSA-3560 (Google Search) http://www.debian.org/security/2016/dsa-3560 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 http://www.openwall.com/lists/oss-security/2016/04/24/1 RedHat Security Advisories: RHSA-2016:2750 http://rhn.redhat.com/errata/RHSA-2016-2750.html SuSE Security Announcement: openSUSE-SU-2016:1167 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/ Common Vulnerability Exposure (CVE) ID: CVE-2015-8866 BugTraq ID: 87470 http://www.securityfocus.com/bid/87470 SuSE Security Announcement: SUSE-SU-2016:1277 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html SuSE Security Announcement: openSUSE-SU-2016:1274 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html SuSE Security Announcement: openSUSE-SU-2016:1373 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html Common Vulnerability Exposure (CVE) ID: CVE-2015-8878 Common Vulnerability Exposure (CVE) ID: CVE-2015-8879 Common Vulnerability Exposure (CVE) ID: CVE-2016-4070 BugTraq ID: 85801 http://www.securityfocus.com/bid/85801 Common Vulnerability Exposure (CVE) ID: CVE-2016-4071 BugTraq ID: 85800 http://www.securityfocus.com/bid/85800 https://www.exploit-db.com/exploits/39645/ Common Vulnerability Exposure (CVE) ID: CVE-2016-4072 BugTraq ID: 85993 http://www.securityfocus.com/bid/85993 Common Vulnerability Exposure (CVE) ID: CVE-2016-4073 BugTraq ID: 85991 http://www.securityfocus.com/bid/85991 Common Vulnerability Exposure (CVE) ID: CVE-2016-4343 BugTraq ID: 89179 http://www.securityfocus.com/bid/89179 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.openwall.com/lists/oss-security/2016/04/28/2 SuSE Security Announcement: openSUSE-SU-2016:1357 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html Common Vulnerability Exposure (CVE) ID: CVE-2016-4537 BugTraq ID: 90173 http://www.securityfocus.com/bid/90173 Debian Security Information: DSA-3602 (Google Search) http://www.debian.org/security/2016/dsa-3602 http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://www.openwall.com/lists/oss-security/2016/05/05/21 SuSE Security Announcement: openSUSE-SU-2016:1524 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html Common Vulnerability Exposure (CVE) ID: CVE-2016-4539 BugTraq ID: 90174 http://www.securityfocus.com/bid/90174 Common Vulnerability Exposure (CVE) ID: CVE-2016-4540 BugTraq ID: 90172 http://www.securityfocus.com/bid/90172 Common Vulnerability Exposure (CVE) ID: CVE-2016-4541 Common Vulnerability Exposure (CVE) ID: CVE-2016-4542 BugTraq ID: 89844 http://www.securityfocus.com/bid/89844 Common Vulnerability Exposure (CVE) ID: CVE-2016-4543 Common Vulnerability Exposure (CVE) ID: CVE-2016-4544 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |