Lucene search

K
amazonAmazonALAS-2018-1067
HistoryAug 22, 2018 - 7:31 p.m.

Medium: php72

2018-08-2219:31:00
alas.aws.amazon.com
505

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

77.6%

Issue Overview:

exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.(CVE-2018-14851)

exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.(CVE-2018-12882)

An issue was discovered in PHP 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.(CVE-2018-14883)

Affected Packages:

php72

Issue Correction:
Run yum update php72 to update your system.

New Packages:

i686:  
    php72-xml-7.2.8-1.5.amzn1.i686  
    php72-pdo-dblib-7.2.8-1.5.amzn1.i686  
    php72-imap-7.2.8-1.5.amzn1.i686  
    php72-bcmath-7.2.8-1.5.amzn1.i686  
    php72-pspell-7.2.8-1.5.amzn1.i686  
    php72-opcache-7.2.8-1.5.amzn1.i686  
    php72-gd-7.2.8-1.5.amzn1.i686  
    php72-embedded-7.2.8-1.5.amzn1.i686  
    php72-snmp-7.2.8-1.5.amzn1.i686  
    php72-dba-7.2.8-1.5.amzn1.i686  
    php72-mbstring-7.2.8-1.5.amzn1.i686  
    php72-ldap-7.2.8-1.5.amzn1.i686  
    php72-mysqlnd-7.2.8-1.5.amzn1.i686  
    php72-json-7.2.8-1.5.amzn1.i686  
    php72-pgsql-7.2.8-1.5.amzn1.i686  
    php72-intl-7.2.8-1.5.amzn1.i686  
    php72-common-7.2.8-1.5.amzn1.i686  
    php72-odbc-7.2.8-1.5.amzn1.i686  
    php72-recode-7.2.8-1.5.amzn1.i686  
    php72-debuginfo-7.2.8-1.5.amzn1.i686  
    php72-fpm-7.2.8-1.5.amzn1.i686  
    php72-gmp-7.2.8-1.5.amzn1.i686  
    php72-7.2.8-1.5.amzn1.i686  
    php72-dbg-7.2.8-1.5.amzn1.i686  
    php72-process-7.2.8-1.5.amzn1.i686  
    php72-devel-7.2.8-1.5.amzn1.i686  
    php72-xmlrpc-7.2.8-1.5.amzn1.i686  
    php72-cli-7.2.8-1.5.amzn1.i686  
    php72-enchant-7.2.8-1.5.amzn1.i686  
    php72-pdo-7.2.8-1.5.amzn1.i686  
    php72-tidy-7.2.8-1.5.amzn1.i686  
    php72-soap-7.2.8-1.5.amzn1.i686  
  
src:  
    php72-7.2.8-1.5.amzn1.src  
  
x86_64:  
    php72-pspell-7.2.8-1.5.amzn1.x86_64  
    php72-json-7.2.8-1.5.amzn1.x86_64  
    php72-enchant-7.2.8-1.5.amzn1.x86_64  
    php72-pgsql-7.2.8-1.5.amzn1.x86_64  
    php72-common-7.2.8-1.5.amzn1.x86_64  
    php72-bcmath-7.2.8-1.5.amzn1.x86_64  
    php72-snmp-7.2.8-1.5.amzn1.x86_64  
    php72-odbc-7.2.8-1.5.amzn1.x86_64  
    php72-dbg-7.2.8-1.5.amzn1.x86_64  
    php72-intl-7.2.8-1.5.amzn1.x86_64  
    php72-gd-7.2.8-1.5.amzn1.x86_64  
    php72-cli-7.2.8-1.5.amzn1.x86_64  
    php72-embedded-7.2.8-1.5.amzn1.x86_64  
    php72-imap-7.2.8-1.5.amzn1.x86_64  
    php72-xmlrpc-7.2.8-1.5.amzn1.x86_64  
    php72-opcache-7.2.8-1.5.amzn1.x86_64  
    php72-7.2.8-1.5.amzn1.x86_64  
    php72-xml-7.2.8-1.5.amzn1.x86_64  
    php72-tidy-7.2.8-1.5.amzn1.x86_64  
    php72-mbstring-7.2.8-1.5.amzn1.x86_64  
    php72-pdo-7.2.8-1.5.amzn1.x86_64  
    php72-devel-7.2.8-1.5.amzn1.x86_64  
    php72-dba-7.2.8-1.5.amzn1.x86_64  
    php72-process-7.2.8-1.5.amzn1.x86_64  
    php72-debuginfo-7.2.8-1.5.amzn1.x86_64  
    php72-mysqlnd-7.2.8-1.5.amzn1.x86_64  
    php72-ldap-7.2.8-1.5.amzn1.x86_64  
    php72-gmp-7.2.8-1.5.amzn1.x86_64  
    php72-recode-7.2.8-1.5.amzn1.x86_64  
    php72-soap-7.2.8-1.5.amzn1.x86_64  
    php72-pdo-dblib-7.2.8-1.5.amzn1.x86_64  
    php72-fpm-7.2.8-1.5.amzn1.x86_64  

Additional References

Red Hat: CVE-2018-12882, CVE-2018-14851, CVE-2018-14883

Mitre: CVE-2018-12882, CVE-2018-14851, CVE-2018-14883

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

77.6%