|
|
Log in / Subscribe / Register

php: multiple vulnerabilities

Package(s):php CVE #(s):CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418
Created:September 19, 2016 Updated:October 14, 2016
Description: From the Arch Linux advisory:

The package php before version 7.0.11-1 is vulnerable to multiple issues that can lead to arbitrary code execution and denial of service.

- CVE-2016-7411 (arbitrary code execution): A memory Corruption vulnerability was found in php's unserialize method. This happened during the deserialized-object Destruction.

- CVE-2016-7412 (arbitrary code execution): Php's mysqlnd extension assumes the `flags` returned for a BIT field necessarily contains UNSIGNED_FLAG; this might not be the case, with a rogue mysql server, or a MITM attack. A malicious mysql server or MITM can return field metadata for BIT fields that does not contain the UNSIGNED_FLAG, which leads to a heap overflow.

- CVE-2016-7413 (arbitrary code execution): When WDDX tries to deserialize "recordset" element, use after free happens if close tag for the field is not found. This happens only when field names are set.

- CVE-2016-7414 (arbitrary code execution): The entry.uncompressed_filesize* method does not properly verify the input parameters. An attacker can create a signature.bin with size less than 8, when this value is passed to phar_verify_signature as sig_len a heap buffer overflow occurs.

- CVE-2016-7416 (arbitrary code execution): Big locale string causes stack based overflow inside libicu.

- CVE-2016-7417 (insufficient validation): The return value of spl_array_get_hash_table is not properly checked and used on spl_array_get_dimension_ptr_ptr.

- CVE-2016-7418 (denial of service): An attacker can trigger an Out-Of-Bounds Read in php_wddx_push_element of wddx.c. A DoS (null pointer dereference) vulnerability can be triggered in the wddx_deserialize function by providing a maliciously crafted XML string.

Alerts:
SUSE SUSE-SU-2016:2460-2 php7 2016-11-01
SUSE SUSE-SU-2016:2477-2 php5 2016-11-01
openSUSE openSUSE-SU-2016:2540-1 php5 2016-10-14
SUSE SUSE-SU-2016:2477-1 php5 2016-10-07
Debian DSA-3689-1 php5 2016-10-08
SUSE SUSE-SU-2016:2460-1 php7 2016-10-05
SUSE SUSE-SU-2016:2461-1 php53 2016-10-06
SUSE SUSE-SU-2016:2459-1 php53 2016-10-05
Ubuntu USN-3095-1 php5, php7.0 2016-10-04
openSUSE openSUSE-SU-2016:2444-1 php5 2016-10-04
Slackware SSA:2016-267-01 php 2016-09-23
Mageia MGASA-2016-0319 php 2016-09-25
Arch Linux ASA-201609-16 php 2016-09-18
Debian-LTS DLA-749-1 php5 2016-12-16
Gentoo 201611-22 php 2016-12-01

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds