ALAS-2020-1339

Related Vulnerabilities: CVE-2019-11044   CVE-2019-11045   CVE-2019-11046   CVE-2019-11047   CVE-2019-11049   CVE-2019-11050  

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access. (CVE-2019-11045) In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations. (CVE-2019-11049) When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2019-11047) A flaw was discovered in the link function in PHP. When compiled on Windows, it does not correctly handle paths containing NULL bytes. An attacker could abuse this flaw to bypass application checks on file paths. (CVE-2019-11044) When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2019-11050) In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations. (CVE-2019-11046)

ALAS-2020-1339


Amazon Linux AMI Security Advisory: ALAS-2020-1339
Advisory Release Date: 2020-02-04 22:42 Pacific
Advisory Updated Date: 2020-02-07 18:00 Pacific
Severity: Medium

Issue Overview:

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access. (CVE-2019-11045)

In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations. (CVE-2019-11049)

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2019-11047)

A flaw was discovered in the link function in PHP. When compiled on Windows, it does not correctly handle paths containing NULL bytes. An attacker could abuse this flaw to bypass application checks on file paths. (CVE-2019-11044)

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2019-11050)

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations. (CVE-2019-11046)


Affected Packages:

php72, php73


Issue Correction:
Run yum update php72 to update your system.
Run yum update php73 to update your system.

New Packages:
i686:
    php72-debuginfo-7.2.26-1.19.amzn1.i686
    php72-pspell-7.2.26-1.19.amzn1.i686
    php72-pdo-dblib-7.2.26-1.19.amzn1.i686
    php72-gd-7.2.26-1.19.amzn1.i686
    php72-common-7.2.26-1.19.amzn1.i686
    php72-enchant-7.2.26-1.19.amzn1.i686
    php72-tidy-7.2.26-1.19.amzn1.i686
    php72-embedded-7.2.26-1.19.amzn1.i686
    php72-soap-7.2.26-1.19.amzn1.i686
    php72-xmlrpc-7.2.26-1.19.amzn1.i686
    php72-snmp-7.2.26-1.19.amzn1.i686
    php72-pdo-7.2.26-1.19.amzn1.i686
    php72-opcache-7.2.26-1.19.amzn1.i686
    php72-dba-7.2.26-1.19.amzn1.i686
    php72-json-7.2.26-1.19.amzn1.i686
    php72-mysqlnd-7.2.26-1.19.amzn1.i686
    php72-ldap-7.2.26-1.19.amzn1.i686
    php72-recode-7.2.26-1.19.amzn1.i686
    php72-cli-7.2.26-1.19.amzn1.i686
    php72-pgsql-7.2.26-1.19.amzn1.i686
    php72-intl-7.2.26-1.19.amzn1.i686
    php72-odbc-7.2.26-1.19.amzn1.i686
    php72-process-7.2.26-1.19.amzn1.i686
    php72-bcmath-7.2.26-1.19.amzn1.i686
    php72-devel-7.2.26-1.19.amzn1.i686
    php72-xml-7.2.26-1.19.amzn1.i686
    php72-7.2.26-1.19.amzn1.i686
    php72-gmp-7.2.26-1.19.amzn1.i686
    php72-dbg-7.2.26-1.19.amzn1.i686
    php72-mbstring-7.2.26-1.19.amzn1.i686
    php72-fpm-7.2.26-1.19.amzn1.i686
    php72-imap-7.2.26-1.19.amzn1.i686
    php73-gd-7.3.13-1.22.amzn1.i686
    php73-xmlrpc-7.3.13-1.22.amzn1.i686
    php73-fpm-7.3.13-1.22.amzn1.i686
    php73-xml-7.3.13-1.22.amzn1.i686
    php73-7.3.13-1.22.amzn1.i686
    php73-dbg-7.3.13-1.22.amzn1.i686
    php73-embedded-7.3.13-1.22.amzn1.i686
    php73-bcmath-7.3.13-1.22.amzn1.i686
    php73-enchant-7.3.13-1.22.amzn1.i686
    php73-gmp-7.3.13-1.22.amzn1.i686
    php73-ldap-7.3.13-1.22.amzn1.i686
    php73-common-7.3.13-1.22.amzn1.i686
    php73-recode-7.3.13-1.22.amzn1.i686
    php73-pspell-7.3.13-1.22.amzn1.i686
    php73-imap-7.3.13-1.22.amzn1.i686
    php73-snmp-7.3.13-1.22.amzn1.i686
    php73-opcache-7.3.13-1.22.amzn1.i686
    php73-pdo-dblib-7.3.13-1.22.amzn1.i686
    php73-soap-7.3.13-1.22.amzn1.i686
    php73-cli-7.3.13-1.22.amzn1.i686
    php73-process-7.3.13-1.22.amzn1.i686
    php73-pdo-7.3.13-1.22.amzn1.i686
    php73-devel-7.3.13-1.22.amzn1.i686
    php73-mbstring-7.3.13-1.22.amzn1.i686
    php73-json-7.3.13-1.22.amzn1.i686
    php73-tidy-7.3.13-1.22.amzn1.i686
    php73-mysqlnd-7.3.13-1.22.amzn1.i686
    php73-odbc-7.3.13-1.22.amzn1.i686
    php73-intl-7.3.13-1.22.amzn1.i686
    php73-debuginfo-7.3.13-1.22.amzn1.i686
    php73-dba-7.3.13-1.22.amzn1.i686
    php73-pgsql-7.3.13-1.22.amzn1.i686

src:
    php72-7.2.26-1.19.amzn1.src
    php73-7.3.13-1.22.amzn1.src

x86_64:
    php72-tidy-7.2.26-1.19.amzn1.x86_64
    php72-dba-7.2.26-1.19.amzn1.x86_64
    php72-pdo-7.2.26-1.19.amzn1.x86_64
    php72-gmp-7.2.26-1.19.amzn1.x86_64
    php72-cli-7.2.26-1.19.amzn1.x86_64
    php72-mbstring-7.2.26-1.19.amzn1.x86_64
    php72-xmlrpc-7.2.26-1.19.amzn1.x86_64
    php72-bcmath-7.2.26-1.19.amzn1.x86_64
    php72-pgsql-7.2.26-1.19.amzn1.x86_64
    php72-soap-7.2.26-1.19.amzn1.x86_64
    php72-xml-7.2.26-1.19.amzn1.x86_64
    php72-embedded-7.2.26-1.19.amzn1.x86_64
    php72-intl-7.2.26-1.19.amzn1.x86_64
    php72-snmp-7.2.26-1.19.amzn1.x86_64
    php72-pdo-dblib-7.2.26-1.19.amzn1.x86_64
    php72-imap-7.2.26-1.19.amzn1.x86_64
    php72-debuginfo-7.2.26-1.19.amzn1.x86_64
    php72-odbc-7.2.26-1.19.amzn1.x86_64
    php72-enchant-7.2.26-1.19.amzn1.x86_64
    php72-json-7.2.26-1.19.amzn1.x86_64
    php72-7.2.26-1.19.amzn1.x86_64
    php72-process-7.2.26-1.19.amzn1.x86_64
    php72-ldap-7.2.26-1.19.amzn1.x86_64
    php72-common-7.2.26-1.19.amzn1.x86_64
    php72-dbg-7.2.26-1.19.amzn1.x86_64
    php72-devel-7.2.26-1.19.amzn1.x86_64
    php72-opcache-7.2.26-1.19.amzn1.x86_64
    php72-recode-7.2.26-1.19.amzn1.x86_64
    php72-gd-7.2.26-1.19.amzn1.x86_64
    php72-pspell-7.2.26-1.19.amzn1.x86_64
    php72-fpm-7.2.26-1.19.amzn1.x86_64
    php72-mysqlnd-7.2.26-1.19.amzn1.x86_64
    php73-pdo-7.3.13-1.22.amzn1.x86_64
    php73-soap-7.3.13-1.22.amzn1.x86_64
    php73-mbstring-7.3.13-1.22.amzn1.x86_64
    php73-imap-7.3.13-1.22.amzn1.x86_64
    php73-recode-7.3.13-1.22.amzn1.x86_64
    php73-bcmath-7.3.13-1.22.amzn1.x86_64
    php73-fpm-7.3.13-1.22.amzn1.x86_64
    php73-gd-7.3.13-1.22.amzn1.x86_64
    php73-dbg-7.3.13-1.22.amzn1.x86_64
    php73-7.3.13-1.22.amzn1.x86_64
    php73-pgsql-7.3.13-1.22.amzn1.x86_64
    php73-xmlrpc-7.3.13-1.22.amzn1.x86_64
    php73-gmp-7.3.13-1.22.amzn1.x86_64
    php73-cli-7.3.13-1.22.amzn1.x86_64
    php73-ldap-7.3.13-1.22.amzn1.x86_64
    php73-debuginfo-7.3.13-1.22.amzn1.x86_64
    php73-common-7.3.13-1.22.amzn1.x86_64
    php73-tidy-7.3.13-1.22.amzn1.x86_64
    php73-json-7.3.13-1.22.amzn1.x86_64
    php73-process-7.3.13-1.22.amzn1.x86_64
    php73-pspell-7.3.13-1.22.amzn1.x86_64
    php73-xml-7.3.13-1.22.amzn1.x86_64
    php73-snmp-7.3.13-1.22.amzn1.x86_64
    php73-opcache-7.3.13-1.22.amzn1.x86_64
    php73-pdo-dblib-7.3.13-1.22.amzn1.x86_64
    php73-odbc-7.3.13-1.22.amzn1.x86_64
    php73-intl-7.3.13-1.22.amzn1.x86_64
    php73-mysqlnd-7.3.13-1.22.amzn1.x86_64
    php73-embedded-7.3.13-1.22.amzn1.x86_64
    php73-dba-7.3.13-1.22.amzn1.x86_64
    php73-devel-7.3.13-1.22.amzn1.x86_64
    php73-enchant-7.3.13-1.22.amzn1.x86_64