ALAS-2015-507

Related Vulnerabilities: CVE-2015-0231   CVE-2015-2305   CVE-2015-2331  

A use-after-free flaw was found in the way PHP's unserialize() function processed data. If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code. (CVE-2015-0231) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libzip, which is also embedded in PHP, processed certain ZIP archives. If an attacker were able to supply a specially crafted ZIP archive to an application using libzip, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-2331) Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow. (CVE-2015-2305)

ALAS-2015-507


Amazon Linux AMI Security Advisory: ALAS-2015-507
Advisory Release Date: 2015-04-15 21:49 Pacific
Advisory Updated Date: 2015-04-15 22:21 Pacific
Severity: Important

Issue Overview:

A use-after-free flaw was found in the way PHP's unserialize() function processed data. If a remote attacker was able to pass crafted input to PHP's unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code. (CVE-2015-0231)

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libzip, which is also embedded in PHP, processed certain ZIP archives. If an attacker were able to supply a specially crafted ZIP archive to an application using libzip, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-2331)

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow. (CVE-2015-2305)


Affected Packages:

php55


Issue Correction:
Run yum update php55 to update your system.

New Packages:
i686:
    php55-embedded-5.5.23-1.99.amzn1.i686
    php55-mysqlnd-5.5.23-1.99.amzn1.i686
    php55-common-5.5.23-1.99.amzn1.i686
    php55-devel-5.5.23-1.99.amzn1.i686
    php55-pgsql-5.5.23-1.99.amzn1.i686
    php55-recode-5.5.23-1.99.amzn1.i686
    php55-intl-5.5.23-1.99.amzn1.i686
    php55-cli-5.5.23-1.99.amzn1.i686
    php55-gd-5.5.23-1.99.amzn1.i686
    php55-bcmath-5.5.23-1.99.amzn1.i686
    php55-ldap-5.5.23-1.99.amzn1.i686
    php55-mcrypt-5.5.23-1.99.amzn1.i686
    php55-xmlrpc-5.5.23-1.99.amzn1.i686
    php55-process-5.5.23-1.99.amzn1.i686
    php55-gmp-5.5.23-1.99.amzn1.i686
    php55-snmp-5.5.23-1.99.amzn1.i686
    php55-mssql-5.5.23-1.99.amzn1.i686
    php55-tidy-5.5.23-1.99.amzn1.i686
    php55-imap-5.5.23-1.99.amzn1.i686
    php55-5.5.23-1.99.amzn1.i686
    php55-opcache-5.5.23-1.99.amzn1.i686
    php55-pspell-5.5.23-1.99.amzn1.i686
    php55-xml-5.5.23-1.99.amzn1.i686
    php55-debuginfo-5.5.23-1.99.amzn1.i686
    php55-fpm-5.5.23-1.99.amzn1.i686
    php55-pdo-5.5.23-1.99.amzn1.i686
    php55-soap-5.5.23-1.99.amzn1.i686
    php55-odbc-5.5.23-1.99.amzn1.i686
    php55-mbstring-5.5.23-1.99.amzn1.i686
    php55-enchant-5.5.23-1.99.amzn1.i686
    php55-dba-5.5.23-1.99.amzn1.i686

src:
    php55-5.5.23-1.99.amzn1.src

x86_64:
    php55-gd-5.5.23-1.99.amzn1.x86_64
    php55-cli-5.5.23-1.99.amzn1.x86_64
    php55-mssql-5.5.23-1.99.amzn1.x86_64
    php55-common-5.5.23-1.99.amzn1.x86_64
    php55-gmp-5.5.23-1.99.amzn1.x86_64
    php55-process-5.5.23-1.99.amzn1.x86_64
    php55-ldap-5.5.23-1.99.amzn1.x86_64
    php55-pdo-5.5.23-1.99.amzn1.x86_64
    php55-mcrypt-5.5.23-1.99.amzn1.x86_64
    php55-embedded-5.5.23-1.99.amzn1.x86_64
    php55-enchant-5.5.23-1.99.amzn1.x86_64
    php55-mbstring-5.5.23-1.99.amzn1.x86_64
    php55-soap-5.5.23-1.99.amzn1.x86_64
    php55-pspell-5.5.23-1.99.amzn1.x86_64
    php55-recode-5.5.23-1.99.amzn1.x86_64
    php55-mysqlnd-5.5.23-1.99.amzn1.x86_64
    php55-imap-5.5.23-1.99.amzn1.x86_64
    php55-opcache-5.5.23-1.99.amzn1.x86_64
    php55-xml-5.5.23-1.99.amzn1.x86_64
    php55-intl-5.5.23-1.99.amzn1.x86_64
    php55-snmp-5.5.23-1.99.amzn1.x86_64
    php55-devel-5.5.23-1.99.amzn1.x86_64
    php55-pgsql-5.5.23-1.99.amzn1.x86_64
    php55-fpm-5.5.23-1.99.amzn1.x86_64
    php55-tidy-5.5.23-1.99.amzn1.x86_64
    php55-dba-5.5.23-1.99.amzn1.x86_64
    php55-debuginfo-5.5.23-1.99.amzn1.x86_64
    php55-5.5.23-1.99.amzn1.x86_64
    php55-xmlrpc-5.5.23-1.99.amzn1.x86_64
    php55-bcmath-5.5.23-1.99.amzn1.x86_64
    php55-odbc-5.5.23-1.99.amzn1.x86_64