SB2016062314 - Fedora 24 update for php-pecl-zip



SB2016062314 - Fedora 24 update for php-pecl-zip

Published: June 23, 2016 Updated: June 28, 2025

Security Bulletin ID SB2016062314
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2016-3078)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class.


2) Use-after-free error (CVE-ID: CVE-2016-5773)

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The vulnerability exists due to use-after-free in GC algorithm and unserialize. A remote attacker can create a specially crafted zval object and exploit the PHP process by taking over the EIP/RIP.

Successful exploitation of this vulnerability results in complete control over the vulnerable web application and execute arbitrary PHP code on the target system.

Remediation

Install update from vendor's website.