Lucene search

K
amazonAmazonALAS-2018-982
HistoryMar 27, 2018 - 9:37 p.m.

Important: php71

2018-03-2721:37:00
alas.aws.amazon.com
24

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.799 High

EPSS

Percentile

98.3%

Issue Overview:

Stack-based buffer under-read in ext/standard/http_fopen_wrapper.c:php_stream_url_wrap_http_ex function when parsing HTTP response allows denial of service:
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string. (CVE-2018-7584)

Affected Packages:

php71

Issue Correction:
Run yum update php71 to update your system.

New Packages:

i686:  
    php71-7.1.15-1.31.amzn1.i686  
    php71-common-7.1.15-1.31.amzn1.i686  
    php71-tidy-7.1.15-1.31.amzn1.i686  
    php71-opcache-7.1.15-1.31.amzn1.i686  
    php71-ldap-7.1.15-1.31.amzn1.i686  
    php71-pdo-dblib-7.1.15-1.31.amzn1.i686  
    php71-pspell-7.1.15-1.31.amzn1.i686  
    php71-recode-7.1.15-1.31.amzn1.i686  
    php71-pdo-7.1.15-1.31.amzn1.i686  
    php71-bcmath-7.1.15-1.31.amzn1.i686  
    php71-mysqlnd-7.1.15-1.31.amzn1.i686  
    php71-gmp-7.1.15-1.31.amzn1.i686  
    php71-snmp-7.1.15-1.31.amzn1.i686  
    php71-cli-7.1.15-1.31.amzn1.i686  
    php71-embedded-7.1.15-1.31.amzn1.i686  
    php71-xml-7.1.15-1.31.amzn1.i686  
    php71-debuginfo-7.1.15-1.31.amzn1.i686  
    php71-pgsql-7.1.15-1.31.amzn1.i686  
    php71-process-7.1.15-1.31.amzn1.i686  
    php71-enchant-7.1.15-1.31.amzn1.i686  
    php71-gd-7.1.15-1.31.amzn1.i686  
    php71-mcrypt-7.1.15-1.31.amzn1.i686  
    php71-dbg-7.1.15-1.31.amzn1.i686  
    php71-odbc-7.1.15-1.31.amzn1.i686  
    php71-devel-7.1.15-1.31.amzn1.i686  
    php71-fpm-7.1.15-1.31.amzn1.i686  
    php71-mbstring-7.1.15-1.31.amzn1.i686  
    php71-intl-7.1.15-1.31.amzn1.i686  
    php71-soap-7.1.15-1.31.amzn1.i686  
    php71-imap-7.1.15-1.31.amzn1.i686  
    php71-json-7.1.15-1.31.amzn1.i686  
    php71-dba-7.1.15-1.31.amzn1.i686  
    php71-xmlrpc-7.1.15-1.31.amzn1.i686  
  
src:  
    php71-7.1.15-1.31.amzn1.src  
  
x86_64:  
    php71-common-7.1.15-1.31.amzn1.x86_64  
    php71-gmp-7.1.15-1.31.amzn1.x86_64  
    php71-gd-7.1.15-1.31.amzn1.x86_64  
    php71-debuginfo-7.1.15-1.31.amzn1.x86_64  
    php71-intl-7.1.15-1.31.amzn1.x86_64  
    php71-json-7.1.15-1.31.amzn1.x86_64  
    php71-tidy-7.1.15-1.31.amzn1.x86_64  
    php71-snmp-7.1.15-1.31.amzn1.x86_64  
    php71-dba-7.1.15-1.31.amzn1.x86_64  
    php71-mysqlnd-7.1.15-1.31.amzn1.x86_64  
    php71-ldap-7.1.15-1.31.amzn1.x86_64  
    php71-pgsql-7.1.15-1.31.amzn1.x86_64  
    php71-enchant-7.1.15-1.31.amzn1.x86_64  
    php71-xmlrpc-7.1.15-1.31.amzn1.x86_64  
    php71-mbstring-7.1.15-1.31.amzn1.x86_64  
    php71-odbc-7.1.15-1.31.amzn1.x86_64  
    php71-process-7.1.15-1.31.amzn1.x86_64  
    php71-dbg-7.1.15-1.31.amzn1.x86_64  
    php71-soap-7.1.15-1.31.amzn1.x86_64  
    php71-7.1.15-1.31.amzn1.x86_64  
    php71-embedded-7.1.15-1.31.amzn1.x86_64  
    php71-pspell-7.1.15-1.31.amzn1.x86_64  
    php71-pdo-7.1.15-1.31.amzn1.x86_64  
    php71-opcache-7.1.15-1.31.amzn1.x86_64  
    php71-fpm-7.1.15-1.31.amzn1.x86_64  
    php71-xml-7.1.15-1.31.amzn1.x86_64  
    php71-devel-7.1.15-1.31.amzn1.x86_64  
    php71-recode-7.1.15-1.31.amzn1.x86_64  
    php71-bcmath-7.1.15-1.31.amzn1.x86_64  
    php71-imap-7.1.15-1.31.amzn1.x86_64  
    php71-mcrypt-7.1.15-1.31.amzn1.x86_64  
    php71-cli-7.1.15-1.31.amzn1.x86_64  
    php71-pdo-dblib-7.1.15-1.31.amzn1.x86_64  

Additional References

Red Hat: CVE-2018-7584

Mitre: CVE-2018-7584

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.799 High

EPSS

Percentile

98.3%