SB2016031110 - Multiple vulnerabilities in PHP



SB2016031110 - Multiple vulnerabilities in PHP

Published: March 11, 2016 Updated: June 8, 2025

Security Bulletin ID SB2016031110
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2016-2116)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file. A remote attacker can perform a denial of service attack.


2) Heap-based buffer overflow (CVE-ID: CVE-2008-5557)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6. A remote attacker can use a crafted string containing an HTML entity to trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Buffer overflow (CVE-ID: CVE-2008-2829)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.


4) Path traversal (CVE-ID: CVE-2008-2665)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the posix_access function in PHP 5.2.6 and earlier. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to bypass safe_mode restrictions via a . (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.


Remediation

Install update from vendor's website.

References