Lucene search

K
debianDebianDEBIAN:DSA-4081-1:FFD0A
HistoryJan 08, 2018 - 10:33 p.m.

[SECURITY] [DSA 4081-1] php5 security update

2018-01-0822:33:54
lists.debian.org
24

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.016 Low

EPSS

Percentile

87.2%


Debian Security Advisory DSA-4081-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
January 08, 2018 https://www.debian.org/security/faq


Package : php5
CVE ID : CVE-2017-11142 CVE-2017-11143 CVE-2017-11144
CVE-2017-11145 CVE-2017-11628 CVE-2017-12933
CVE-2017-16642

Several vulnerabilities were found in PHP, a widely-used open source
general purpose scripting language:

CVE-2017-11142

Denial of service via overly long form variables

CVE-2017-11143

Invalid free() in wddx_deserialize()

CVE-2017-11144

Denial of service in openssl extension due to incorrect return value
check of OpenSSL sealing function.

CVE-2017-11145

Out-of-bounds read in wddx_deserialize()

CVE-2017-11628

Buffer overflow in PHP INI parsing API

CVE-2017-12933

Buffer overread in finish_nested_data()

CVE-2017-16642

Out-of-bounds read in timelib_meridian()

For the oldstable distribution (jessie), these problems have been fixed
in version 5.6.33+dfsg-0+deb8u1.

We recommend that you upgrade your php5 packages.

For the detailed security status of php5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php5

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.016 Low

EPSS

Percentile

87.2%