SB2016062313 - Fedora 23 update for php-pecl-zip
Published: June 23, 2016 Updated: June 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2016-3078)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class.
2) Use-after-free error (CVE-ID: CVE-2016-5773)
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.
The vulnerability exists due to use-after-free in GC algorithm and unserialize. A remote attacker can create a specially crafted zval object and exploit the PHP process by taking over the EIP/RIP.
Successful exploitation of this vulnerability results in complete control over the vulnerable web application and execute arbitrary PHP code on the target system.Remediation
Install update from vendor's website.