Lucene search

K
debianDebianDEBIAN:DLA-533-1:70F1F
HistoryJun 29, 2016 - 6:09 p.m.

[SECURITY] [DLA 533-1] php5 security update

2016-06-2918:09:25
lists.debian.org
40

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

8.5

Confidence

Low

EPSS

0.06

Percentile

93.5%

Package : php5
Version : 5.4.45-0+deb7u4
CVE ID : CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096
PHP bugs : 70661 70728 70741 70480

  • CVE-2016-5093.patch
    Absence of null character causes unexpected zend_string length and
    leaks heap memory. The test script uses locale_get_primary_language
    to reach get_icu_value_internal but there are some other functions
    that also trigger this issue:
    locale_canonicalize, locale_filter_matches,
    locale_lookup, locale_parse
  • CVE-2016-5094.patch
    don't create strings with lengths outside int range
  • CVE-2016-5095.patch
    similar to CVE-2016-5094
    don't create strings with lengths outside int range
  • CVE-2016-5096.patch
    int/size_t confusion in fread
  • CVE-TEMP-bug-70661.patch
    bug70661: Use After Free Vulnerability in WDDX Packet Deserialization
  • CVE-TEMP-bug-70728.patch
    bug70728: Type Confusion Vulnerability in PHP_to_XMLRPC_worker()
  • CVE-TEMP-bug-70741.patch
    bug70741: Session WDDX Packet Deserialization Type Confusion
    Vulnerability
  • CVE-TEMP-bug-70480-raw.patch
    bug70480: php_url_parse_ex() buffer overflow read

For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u4.

We recommend that you upgrade your php5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian7allphp5< 5.4.45-0+deb7u4php5_5.4.45-0+deb7u4_all.deb
Debian8allphp5< 5.6.22+dfsg-0+deb8u1php5_5.6.22+dfsg-0+deb8u1_all.deb

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

8.5

Confidence

Low

EPSS

0.06

Percentile

93.5%