Lucene search

K
amazonAmazonALAS-2015-508
HistoryApr 15, 2015 - 9:50 p.m.

Important: php56

2015-04-1521:50:00
alas.aws.amazon.com
43

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.953 High

EPSS

Percentile

99.4%

Issue Overview:

A use-after-free flaw was found in the way PHP’s unserialize() function processed data. If a remote attacker was able to pass crafted input to PHP’s unserialize() function, they could cause the PHP interpreter to crash or, possibly, execute arbitrary code. (CVE-2015-0231)

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libzip, which is also embedded in PHP, processed certain ZIP archives. If an attacker were able to supply a specially crafted ZIP archive to an application using libzip, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-2331)

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow. (CVE-2015-2305)

Affected Packages:

php56

Issue Correction:
Run yum update php56 to update your system.

New Packages:

i686:  
    php56-gd-5.6.7-1.110.amzn1.i686  
    php56-bcmath-5.6.7-1.110.amzn1.i686  
    php56-mysqlnd-5.6.7-1.110.amzn1.i686  
    php56-gmp-5.6.7-1.110.amzn1.i686  
    php56-imap-5.6.7-1.110.amzn1.i686  
    php56-devel-5.6.7-1.110.amzn1.i686  
    php56-soap-5.6.7-1.110.amzn1.i686  
    php56-ldap-5.6.7-1.110.amzn1.i686  
    php56-dbg-5.6.7-1.110.amzn1.i686  
    php56-pdo-5.6.7-1.110.amzn1.i686  
    php56-common-5.6.7-1.110.amzn1.i686  
    php56-embedded-5.6.7-1.110.amzn1.i686  
    php56-enchant-5.6.7-1.110.amzn1.i686  
    php56-xmlrpc-5.6.7-1.110.amzn1.i686  
    php56-5.6.7-1.110.amzn1.i686  
    php56-mssql-5.6.7-1.110.amzn1.i686  
    php56-odbc-5.6.7-1.110.amzn1.i686  
    php56-xml-5.6.7-1.110.amzn1.i686  
    php56-fpm-5.6.7-1.110.amzn1.i686  
    php56-intl-5.6.7-1.110.amzn1.i686  
    php56-mcrypt-5.6.7-1.110.amzn1.i686  
    php56-pspell-5.6.7-1.110.amzn1.i686  
    php56-snmp-5.6.7-1.110.amzn1.i686  
    php56-dba-5.6.7-1.110.amzn1.i686  
    php56-pgsql-5.6.7-1.110.amzn1.i686  
    php56-opcache-5.6.7-1.110.amzn1.i686  
    php56-recode-5.6.7-1.110.amzn1.i686  
    php56-process-5.6.7-1.110.amzn1.i686  
    php56-debuginfo-5.6.7-1.110.amzn1.i686  
    php56-cli-5.6.7-1.110.amzn1.i686  
    php56-tidy-5.6.7-1.110.amzn1.i686  
    php56-mbstring-5.6.7-1.110.amzn1.i686  
  
src:  
    php56-5.6.7-1.110.amzn1.src  
  
x86_64:  
    php56-pgsql-5.6.7-1.110.amzn1.x86_64  
    php56-fpm-5.6.7-1.110.amzn1.x86_64  
    php56-common-5.6.7-1.110.amzn1.x86_64  
    php56-mbstring-5.6.7-1.110.amzn1.x86_64  
    php56-cli-5.6.7-1.110.amzn1.x86_64  
    php56-bcmath-5.6.7-1.110.amzn1.x86_64  
    php56-recode-5.6.7-1.110.amzn1.x86_64  
    php56-process-5.6.7-1.110.amzn1.x86_64  
    php56-ldap-5.6.7-1.110.amzn1.x86_64  
    php56-snmp-5.6.7-1.110.amzn1.x86_64  
    php56-xmlrpc-5.6.7-1.110.amzn1.x86_64  
    php56-mcrypt-5.6.7-1.110.amzn1.x86_64  
    php56-intl-5.6.7-1.110.amzn1.x86_64  
    php56-pdo-5.6.7-1.110.amzn1.x86_64  
    php56-5.6.7-1.110.amzn1.x86_64  
    php56-mssql-5.6.7-1.110.amzn1.x86_64  
    php56-imap-5.6.7-1.110.amzn1.x86_64  
    php56-devel-5.6.7-1.110.amzn1.x86_64  
    php56-soap-5.6.7-1.110.amzn1.x86_64  
    php56-mysqlnd-5.6.7-1.110.amzn1.x86_64  
    php56-enchant-5.6.7-1.110.amzn1.x86_64  
    php56-pspell-5.6.7-1.110.amzn1.x86_64  
    php56-tidy-5.6.7-1.110.amzn1.x86_64  
    php56-embedded-5.6.7-1.110.amzn1.x86_64  
    php56-dbg-5.6.7-1.110.amzn1.x86_64  
    php56-dba-5.6.7-1.110.amzn1.x86_64  
    php56-gd-5.6.7-1.110.amzn1.x86_64  
    php56-gmp-5.6.7-1.110.amzn1.x86_64  
    php56-opcache-5.6.7-1.110.amzn1.x86_64  
    php56-debuginfo-5.6.7-1.110.amzn1.x86_64  
    php56-odbc-5.6.7-1.110.amzn1.x86_64  
    php56-xml-5.6.7-1.110.amzn1.x86_64  

Additional References

Red Hat: CVE-2015-0231, CVE-2015-2305, CVE-2015-2331

Mitre: CVE-2015-0231, CVE-2015-2305, CVE-2015-2331

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.953 High

EPSS

Percentile

99.4%