7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.037 Low
EPSS
Percentile
91.8%
According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.26. It is, therefore, affected by multiple vulnerabilities :
A flaw exists in ext/standard/var_unserializer.re when destroying deserialized objects due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a deserialize call that references a partially constructed object, to corrupt memory, resulting in a denial of service condition. (CVE-2016-7411)
An heap buffer overflow condition exists in the php_mysqlnd_rowp_read_text_protocol_aux() function within file ext/mysqlnd/mysqlnd_wireprotocol.c due to a failure to verify that a BIT field has the UNSIGNED_FLAG flag. An unauthenticated, remote attacker can exploit this, via specially crafted field metadata, to cause a denial of service condition. (CVE-2016-7412)
A use-after-free error exists in the wddx_stack_destroy() function within file ext/wddx/wddx.c when deserializing recordset elements.
An unauthenticated, remote attacker can exploit this, via a specially crafted wddxPacket XML document, to cause a denial of service condition. (CVE-2016-7413)
An out-of-bounds access error exists in the phar_parse_zipfile() function within file ext/phar/zip.c due to a failure to ensure that the uncompressed_filesize field is large enough. An unauthenticated, remote attacker can exploit this, via a specially crafted archive, to cause a denial of service condition. (CVE-2016-7414)
A stack-based buffer overflow condition exists in the ICU4C library, specifically within file common/locid.cpp in the msgfmt_format_message() function, due to a failure to properly restrict the locale length provided to the Locale class. An unauthenticated, remote attacker can exploit this, via a long first argument to a MessageFormatter::formatMessage() function call, to cause a denial of service condition. (CVE-2016-7416)
A flaw exists in the spl_array_get_dimension_ptr_ptr() function within file ext/spl/spl_array.c due to a failure to properly validate the return value and data type when deserializing SplArray. An unauthenticated, remote attacker can exploit this, via specially crafted serialized data, to cause a denial of service condition.
(CVE-2016-7417)
An out-of-bounds read error exists in the php_wddx_push_element() function within file ext/wddx/wddx.c when handling an incorrect boolean element, which leads to mishandling the wddx_deserialize() call. An unauthenticated, remote attacker can exploit this, via a specially crafted wddxPacket XML document, to cause a denial of service condition. (CVE-2016-7418)
An out-of-bounds access error exists in the phar_parse_tarfile() function within file ext/phar/tar.c when handling the verification of signatures. An unauthenticated, remote attacker can exploit this to cause an unspecified impact.
An integer overflow condition exists in the fgetcsv() function when handling CSV field lengths due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code.
An integer overflow condition exists in the wordwrap() function within file ext/standard/string.c due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code.
An integer overflow condition exists in the fgets() function within file ext/standard/file.c due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code.
An integer overflow condition exists in the xml_utf8_encode() function within file ext/xml/xml.c due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to cause an unspecified impact.
A flaw exists in the exif_process_IFD_in_TIFF() function within file ext/exif/exif.c when handling uninitialized thumbnail data. An unauthenticated, remote attacker can exploit this to disclose memory contents.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(93656);
script_version("1.19");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");
script_cve_id(
"CVE-2016-7411",
"CVE-2016-7412",
"CVE-2016-7413",
"CVE-2016-7414",
"CVE-2016-7416",
"CVE-2016-7417",
"CVE-2016-7418"
);
script_bugtraq_id(
93004,
93005,
93006,
93007,
93008,
93009,
93011
);
script_name(english:"PHP 5.6.x < 5.6.26 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The version of PHP running on the remote web server is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"According to its banner, the version of PHP running on the remote web
server is 5.6.x prior to 5.6.26. It is, therefore, affected by
multiple vulnerabilities :
- A flaw exists in ext/standard/var_unserializer.re when
destroying deserialized objects due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this, via a deserialize
call that references a partially constructed object, to
corrupt memory, resulting in a denial of service
condition. (CVE-2016-7411)
- An heap buffer overflow condition exists in the
php_mysqlnd_rowp_read_text_protocol_aux() function
within file ext/mysqlnd/mysqlnd_wireprotocol.c due to
a failure to verify that a BIT field has the
UNSIGNED_FLAG flag. An unauthenticated, remote attacker
can exploit this, via specially crafted field metadata,
to cause a denial of service condition. (CVE-2016-7412)
- A use-after-free error exists in the
wddx_stack_destroy() function within file
ext/wddx/wddx.c when deserializing recordset elements.
An unauthenticated, remote attacker can exploit this,
via a specially crafted wddxPacket XML document, to
cause a denial of service condition. (CVE-2016-7413)
- An out-of-bounds access error exists in the
phar_parse_zipfile() function within file ext/phar/zip.c
due to a failure to ensure that the
uncompressed_filesize field is large enough. An
unauthenticated, remote attacker can exploit this, via a
specially crafted archive, to cause a denial of service
condition. (CVE-2016-7414)
- A stack-based buffer overflow condition exists in the
ICU4C library, specifically within file common/locid.cpp
in the msgfmt_format_message() function, due to a
failure to properly restrict the locale length provided
to the Locale class. An unauthenticated, remote attacker
can exploit this, via a long first argument to a
MessageFormatter::formatMessage() function call, to
cause a denial of service condition. (CVE-2016-7416)
- A flaw exists in the spl_array_get_dimension_ptr_ptr()
function within file ext/spl/spl_array.c due to a
failure to properly validate the return value and data
type when deserializing SplArray. An unauthenticated,
remote attacker can exploit this, via specially crafted
serialized data, to cause a denial of service condition.
(CVE-2016-7417)
- An out-of-bounds read error exists in the
php_wddx_push_element() function within file
ext/wddx/wddx.c when handling an incorrect boolean
element, which leads to mishandling the
wddx_deserialize() call. An unauthenticated, remote
attacker can exploit this, via a specially crafted
wddxPacket XML document, to cause a denial of service
condition. (CVE-2016-7418)
- An out-of-bounds access error exists in the
phar_parse_tarfile() function within file ext/phar/tar.c
when handling the verification of signatures. An
unauthenticated, remote attacker can exploit this to
cause an unspecified impact.
- An integer overflow condition exists in the fgetcsv()
function when handling CSV field lengths due to improper
validation of certain input. An unauthenticated, remote
attacker can exploit this to corrupt memory, resulting
in a denial of service condition or the execution of
arbitrary code.
- An integer overflow condition exists in the wordwrap()
function within file ext/standard/string.c due to
improper validation of certain input. An
unauthenticated, remote attacker can exploit this to
corrupt memory, resulting in a denial of service
condition or the execution of arbitrary code.
- An integer overflow condition exists in the fgets()
function within file ext/standard/file.c due to improper
validation of certain input. An unauthenticated, remote
attacker can exploit this to corrupt memory, resulting
in a denial of service condition or the execution of
arbitrary code.
- An integer overflow condition exists in the
xml_utf8_encode() function within file ext/xml/xml.c due
to improper validation of certain input. An
unauthenticated, remote attacker can exploit this to
cause an unspecified impact.
- A flaw exists in the exif_process_IFD_in_TIFF() function
within file ext/exif/exif.c when handling uninitialized
thumbnail data. An unauthenticated, remote attacker can
exploit this to disclose memory contents.");
script_set_attribute(attribute:"see_also", value:"https://secure.php.net/ChangeLog-5.php#5.6.26");
script_set_attribute(attribute:"solution", value:
"Upgrade to PHP version 5.6.26 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-7411");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/13");
script_set_attribute(attribute:"patch_publication_date", value:"2016/09/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/09/22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:php:php");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2016-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("php_version.nasl");
script_require_keys("www/PHP");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");
port = get_http_port(default:80, php:TRUE);
php = get_php_from_kb(
port : port,
exit_on_fail : TRUE
);
version = php["ver"];
source = php["src"];
backported = get_kb_item('www/php/'+port+'/'+version+'/backported');
if (report_paranoia < 2 && backported)
audit(AUDIT_BACKPORT_SERVICE, port, "PHP "+version+" install");
# Check that it is the correct version of PHP
if (version =~ "^5(\.6)?$")
audit(AUDIT_VER_NOT_GRANULAR, "PHP", port, version);
if (version !~ "^5\.6\.") audit(AUDIT_NOT_DETECT, "PHP version 5.6.x", port);
if (version =~ "^5\.6\." && ver_compare(ver:version, fix:"5.6.26", strict:FALSE) < 0){
security_report_v4(
port : port,
extra :
'\n Version source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : 5.6.26' +
'\n',
severity:SECURITY_HOLE
);
}
else audit(AUDIT_LISTEN_NOT_VULN, "PHP", port, version);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
secure.php.net/ChangeLog-5.php#5.6.26
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.037 Low
EPSS
Percentile
91.8%