Debian: DSA-3344-1: php5 security update

    Date27 Aug 2015
    CategoryDebian
    128
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in the PHP language: CVE-2015-4598
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3344-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    	
    https://www.debian.org/security/                       Sebastien Delafond
    August 27, 2015                       https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : php5
    CVE ID         : CVE-2015-4598 CVE-2015-4643 CVE-2015-4644 CVE-2015-5589 
                     CVE-2015-5590
    
    Multiple vulnerabilities have been discovered in the PHP language:
    
    CVE-2015-4598
    
        thoger at redhat dot com discovered that paths containing a NUL
        character were improperly handled, thus allowing an attacker to
        manipulate unexpected files on the server.
    
    CVE-2015-4643
    
        Max Spelsberg discovered an integer overflow flaw leading to a
        heap-based buffer overflow in PHP's FTP extension, when parsing
        listings in FTP server responses. This could lead to a a crash or
        execution of arbitrary code.
    
    CVE-2015-4644
    
        A denial of service through a crash could be caused by a segfault
        in the php_pgsql_meta_data function.
    
    CVE-2015-5589
    
        kwrnel at hotmail dot com discovered that PHP could crash when
        processing an invalid phar file, thus leading to a denial of
        service.
    
    CVE-2015-5590
    
        jared at enhancesoft dot com discovered a buffer overflow in the
        phar_fix_filepath function, that could causes a crash or execution
        of arbitrary code.
    
    Additionally, several other vulnerabilites were fixed:
    
        sean dot heelan at gmail dot com discovered a problem in the
        unserialization of some items, that could lead to arbitrary code
        execution.
    
        stewie at mail dot ru discovered that the phar extension improperly
        handled zip archives with relative paths, which would allow an
        attacker to overwrite files outside of the destination directory.
    
        taoguangchen at icloud dot com discovered several use-after-free
        vulnerabilities that could lead to arbitrary code execution.
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 5.4.44-0+deb7u1.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 5.6.12+dfsg-0+deb8u1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 5.6.12+dfsg-1.
    
    We recommend that you upgrade your php5 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.