Lucene search

K
archlinuxArch LinuxASA-201504-14
HistoryApr 17, 2015 - 12:00 a.m.

php: multiple issues

2015-04-1700:00:00
Arch Linux
lists.archlinux.org
33

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.153 Low

EPSS

Percentile

95.3%

  • CVE-2015-1351 (denial of service)

Use-after-free vulnerability in the _zend_shared_memdup function in
zend_shared_alloc.c in the OPcache extension allows remote attackers to
cause a denial of service or possibly have unspecified other impact via
unknown vectors.

  • CVE-2015-1352 (denial of service)

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql)
extension does not validate token extraction for table names, which
allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted name.

  • CVE-2015-2783 (out-of-bounds read)

The vulnerability can be triggered when parsing a PHAR file at
phar.c:623. The "buf_len" is obtained from the phar file and passed into
php_var_unserialize() as the max argument. Under normal
php_var_unserialize() circumstances, YYCURSOR will always be <= max.
This however can be bypassed when processing a malform phar with a
buf_len that is shorter then the string to be unserialized resulting in
a memory info leak.

OSVersionArchitecturePackageVersionFilename
anyanyanyphp< 5.6.8-1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.153 Low

EPSS

Percentile

95.3%