php5 vulnerabilities

Related Vulnerabilities: CVE-2015-3330   CVE-2015-3329   CVE-2015-2305   CVE-2015-2348   CVE-2015-2783   CVE-2015-2787  

Several security issues were fixed in PHP.

It was discovered that PHP incorrectly handled cleanup when used with Apache 2.4. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-3330)

20 April 2015

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in PHP.

Software Description

  • php5 - HTML-embedded scripting language interpreter

Details

It was discovered that PHP incorrectly handled cleanup when used with Apache 2.4. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-3330)

It was discovered that PHP incorrectly handled opening tar, zip or phar archives through the PHAR extension. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-3329)

It was discovered that PHP incorrectly handled regular expressions. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-2305)

Paulos Yibelo discovered that PHP incorrectly handled moving files when a pathname contained a null character. A remote attacker could use this issue to possibly bypass filename restrictions. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-2348)

It was discovered that PHP incorrectly handled unserializing PHAR files. A remote attacker could use this issue to cause PHP to possibly expose sensitive information. (CVE-2015-2783)

Taoguang Chen discovered that PHP incorrectly handled unserializing certain objects. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-2787)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.10
libapache2-mod-php5 - 5.5.12+dfsg-2ubuntu4.4
php5-cgi - 5.5.12+dfsg-2ubuntu4.4
php5-cli - 5.5.12+dfsg-2ubuntu4.4
php5-fpm - 5.5.12+dfsg-2ubuntu4.4
Ubuntu 14.04 LTS
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.9
php5-cgi - 5.5.9+dfsg-1ubuntu4.9
php5-cli - 5.5.9+dfsg-1ubuntu4.9
php5-fpm - 5.5.9+dfsg-1ubuntu4.9
Ubuntu 12.04 LTS
libapache2-mod-php5 - 5.3.10-1ubuntu3.18
php5-cgi - 5.3.10-1ubuntu3.18
php5-cli - 5.3.10-1ubuntu3.18
php5-fpm - 5.3.10-1ubuntu3.18
Ubuntu 10.04 LTS
libapache2-mod-php5 - 5.3.2-1ubuntu4.30
php5-cgi - 5.3.2-1ubuntu4.30
php5-cli - 5.3.2-1ubuntu4.30

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References