exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-2658-1

Ubuntu Security Notice USN-2658-1
Posted Jul 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2658-1 - Neal Poole and Tomas Hoger discovered that PHP incorrectly handled NULL bytes in file paths. A remote attacker could possibly use this issue to bypass intended restrictions and create or obtain access to sensitive files. Emmanuel Law discovered that the PHP phar extension incorrectly handled filenames starting with a NULL byte. A remote attacker could use this issue with a crafted tar archive to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, php
systems | linux, ubuntu
advisories | CVE-2015-3411, CVE-2015-3412, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4147, CVE-2015-4148, CVE-2015-4598, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604, CVE-2015-4605, CVE-2015-4643, CVE-2015-4644
SHA-256 | 1fc41b927687f1ac2f48366d26ab0ea7c0053a773453977950cd33ec2a6f05f3

Ubuntu Security Notice USN-2658-1

Change Mirror Download
============================================================================
Ubuntu Security Notice USN-2658-1
July 06, 2015

php5 vulnerabilities
============================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php5: HTML-embedded scripting language interpreter

Details:

Neal Poole and Tomas Hoger discovered that PHP incorrectly handled NULL
bytes in file paths. A remote attacker could possibly use this issue to
bypass intended restrictions and create or obtain access to sensitive
files. (CVE-2015-3411, CVE-2015-3412, CVE-2015-4025, CVE-2015-4026,
CVE-2015-4598)

Emmanuel Law discovered that the PHP phar extension incorrectly handled
filenames starting with a NULL byte. A remote attacker could use this issue
with a crafted tar archive to cause a denial of service. (CVE-2015-4021)

Max Spelsberg discovered that PHP incorrectly handled the LIST command
when connecting to remote FTP servers. A malicious FTP server could
possibly use this issue to execute arbitrary code. (CVE-2015-4022,
CVE-2015-4643)

Shusheng Liu discovered that PHP incorrectly handled certain malformed form
data. A remote attacker could use this issue with crafted form data to
cause CPU consumption, leading to a denial of service. (CVE-2015-4024)

Andrea Palazzo discovered that the PHP Soap client incorrectly validated
data types. A remote attacker could use this issue with crafted serialized
data to possibly execute arbitrary code. (CVE-2015-4147)

Andrea Palazzo discovered that the PHP Soap client incorrectly validated
that the uri property is a string. A remote attacker could use this issue
with crafted serialized data to possibly obtain sensitive information.
(CVE-2015-4148)

Taoguang Chen discovered that PHP incorrectly validated data types in
multiple locations. A remote attacker could possibly use these issues to
obtain sensitive information or cause a denial of service. (CVE-2015-4599,
CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603)

It was discovered that the PHP Fileinfo component incorrectly handled
certain files. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
15.04. (CVE-2015-4604, CVE-2015-4605)

It was discovered that PHP incorrectly handled table names in
php_pgsql_meta_data. A local attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service. (CVE-2015-4644)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.2
php5-cgi 5.6.4+dfsg-4ubuntu6.2
php5-cli 5.6.4+dfsg-4ubuntu6.2
php5-fpm 5.6.4+dfsg-4ubuntu6.2

Ubuntu 14.10:
libapache2-mod-php5 5.5.12+dfsg-2ubuntu4.6
php5-cgi 5.5.12+dfsg-2ubuntu4.6
php5-cli 5.5.12+dfsg-2ubuntu4.6
php5-fpm 5.5.12+dfsg-2ubuntu4.6

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.11
php5-cgi 5.5.9+dfsg-1ubuntu4.11
php5-cli 5.5.9+dfsg-1ubuntu4.11
php5-fpm 5.5.9+dfsg-1ubuntu4.11

Ubuntu 12.04 LTS:
libapache2-mod-php5 5.3.10-1ubuntu3.19
php5-cgi 5.3.10-1ubuntu3.19
php5-cli 5.3.10-1ubuntu3.19
php5-fpm 5.3.10-1ubuntu3.19

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2658-1
CVE-2015-3411, CVE-2015-3412, CVE-2015-4021, CVE-2015-4022,
CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4147,
CVE-2015-4148, CVE-2015-4598, CVE-2015-4599, CVE-2015-4600,
CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604,
CVE-2015-4605, CVE-2015-4643, CVE-2015-4644

Package Information:
https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu6.2
https://launchpad.net/ubuntu/+source/php5/5.5.12+dfsg-2ubuntu4.6
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.11
https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.19
Login or Register to add favorites

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close