Lucene search

K
amazonAmazonALAS-2023-1879
HistoryOct 30, 2023 - 11:31 p.m.

Important: php56

2023-10-3023:31:00
alas.aws.amazon.com
5
php security issue
denial of service
yum update
cpu exhaustion
disk space exhaustion
red hat cve
mitre cve

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

25.4%

Issue Overview:

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. (CVE-2023-0662)

Affected Packages:

php56

Issue Correction:
Run yum update php56 to update your system.

New Packages:

i686:  
    php56-pgsql-5.6.40-1.144.amzn1.i686  
    php56-opcache-5.6.40-1.144.amzn1.i686  
    php56-xmlrpc-5.6.40-1.144.amzn1.i686  
    php56-pdo-5.6.40-1.144.amzn1.i686  
    php56-embedded-5.6.40-1.144.amzn1.i686  
    php56-mcrypt-5.6.40-1.144.amzn1.i686  
    php56-enchant-5.6.40-1.144.amzn1.i686  
    php56-fpm-5.6.40-1.144.amzn1.i686  
    php56-gmp-5.6.40-1.144.amzn1.i686  
    php56-snmp-5.6.40-1.144.amzn1.i686  
    php56-gd-5.6.40-1.144.amzn1.i686  
    php56-dbg-5.6.40-1.144.amzn1.i686  
    php56-intl-5.6.40-1.144.amzn1.i686  
    php56-process-5.6.40-1.144.amzn1.i686  
    php56-common-5.6.40-1.144.amzn1.i686  
    php56-recode-5.6.40-1.144.amzn1.i686  
    php56-debuginfo-5.6.40-1.144.amzn1.i686  
    php56-pspell-5.6.40-1.144.amzn1.i686  
    php56-mssql-5.6.40-1.144.amzn1.i686  
    php56-devel-5.6.40-1.144.amzn1.i686  
    php56-soap-5.6.40-1.144.amzn1.i686  
    php56-cli-5.6.40-1.144.amzn1.i686  
    php56-bcmath-5.6.40-1.144.amzn1.i686  
    php56-tidy-5.6.40-1.144.amzn1.i686  
    php56-imap-5.6.40-1.144.amzn1.i686  
    php56-mbstring-5.6.40-1.144.amzn1.i686  
    php56-5.6.40-1.144.amzn1.i686  
    php56-ldap-5.6.40-1.144.amzn1.i686  
    php56-mysqlnd-5.6.40-1.144.amzn1.i686  
    php56-odbc-5.6.40-1.144.amzn1.i686  
    php56-dba-5.6.40-1.144.amzn1.i686  
    php56-xml-5.6.40-1.144.amzn1.i686  
  
src:  
    php56-5.6.40-1.144.amzn1.src  
  
x86_64:  
    php56-mbstring-5.6.40-1.144.amzn1.x86_64  
    php56-recode-5.6.40-1.144.amzn1.x86_64  
    php56-imap-5.6.40-1.144.amzn1.x86_64  
    php56-gmp-5.6.40-1.144.amzn1.x86_64  
    php56-tidy-5.6.40-1.144.amzn1.x86_64  
    php56-cli-5.6.40-1.144.amzn1.x86_64  
    php56-process-5.6.40-1.144.amzn1.x86_64  
    php56-embedded-5.6.40-1.144.amzn1.x86_64  
    php56-ldap-5.6.40-1.144.amzn1.x86_64  
    php56-debuginfo-5.6.40-1.144.amzn1.x86_64  
    php56-dba-5.6.40-1.144.amzn1.x86_64  
    php56-mcrypt-5.6.40-1.144.amzn1.x86_64  
    php56-opcache-5.6.40-1.144.amzn1.x86_64  
    php56-dbg-5.6.40-1.144.amzn1.x86_64  
    php56-odbc-5.6.40-1.144.amzn1.x86_64  
    php56-bcmath-5.6.40-1.144.amzn1.x86_64  
    php56-common-5.6.40-1.144.amzn1.x86_64  
    php56-pgsql-5.6.40-1.144.amzn1.x86_64  
    php56-enchant-5.6.40-1.144.amzn1.x86_64  
    php56-soap-5.6.40-1.144.amzn1.x86_64  
    php56-devel-5.6.40-1.144.amzn1.x86_64  
    php56-mssql-5.6.40-1.144.amzn1.x86_64  
    php56-pdo-5.6.40-1.144.amzn1.x86_64  
    php56-intl-5.6.40-1.144.amzn1.x86_64  
    php56-5.6.40-1.144.amzn1.x86_64  
    php56-xmlrpc-5.6.40-1.144.amzn1.x86_64  
    php56-snmp-5.6.40-1.144.amzn1.x86_64  
    php56-pspell-5.6.40-1.144.amzn1.x86_64  
    php56-mysqlnd-5.6.40-1.144.amzn1.x86_64  
    php56-fpm-5.6.40-1.144.amzn1.x86_64  
    php56-gd-5.6.40-1.144.amzn1.x86_64  
    php56-xml-5.6.40-1.144.amzn1.x86_64  

Additional References

Red Hat: CVE-2023-0662

Mitre: CVE-2023-0662

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

25.4%