php5 vulnerabilities

Related Vulnerabilities: CVE-2014-3587   CVE-2014-3597  

php5 could be made to crash or run programs if it received specially crafted network traffic.

It was discovered that the Fileinfo component in php5 contains an integer overflow. An attacker could use this flaw to cause a denial of service or possibly execute arbitrary code via a crafted CDF file. (CVE-2014-3587)

10 September 2014

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

php5 could be made to crash or run programs if it received specially crafted network traffic.

Software Description

  • php5 - HTML-embedded scripting language interpreter

Details

It was discovered that the Fileinfo component in php5 contains an integer overflow. An attacker could use this flaw to cause a denial of service or possibly execute arbitrary code via a crafted CDF file. (CVE-2014-3587)

It was discovered that the php_parserr function contains multiple buffer overflows. An attacker could use this flaw to cause a denial of service or possibly execute arbitrary code via crafted DNS records. (CVE-2014-3597)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.4
php5 - 5.5.9+dfsg-1ubuntu4.4
php5-cgi - 5.5.9+dfsg-1ubuntu4.4
php5-fpm - 5.5.9+dfsg-1ubuntu4.4
Ubuntu 12.04 LTS
libapache2-mod-php5 - 5.3.10-1ubuntu3.14
php5 - 5.3.10-1ubuntu3.14
php5-cgi - 5.3.10-1ubuntu3.14
php5-fpm - 5.3.10-1ubuntu3.14
Ubuntu 10.04 LTS
libapache2-mod-php5 - 5.3.2-1ubuntu4.27
php5 - 5.3.2-1ubuntu4.27
php5-cgi - 5.3.2-1ubuntu4.27

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Apache or php5-fpm to make all the necessary changes.

References