SB2017022104 - Gentoo update for PHP
Published: February 21, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Incorrect calculation (CVE-ID: CVE-2016-10158)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the exif_convert_any_to_int function in ext/exif/exif.c due to numeric errors. A remote attacker can submit specially crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1 and cause the service to crash.
2) Integer overflow (CVE-ID: CVE-2016-10159)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the phar_parse_pharfile function in ext/phar/phar.c due to integer overflow. A remote attacker can submit a truncated manifest entry in a PHAR archive and cause the service to crash.
3) Off-by-one error (CVE-ID: CVE-2016-10160)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists in the phar_parse_pharfile function in ext/phar/phar.c due to off-by-one error. A remote attacker can submit a specially crafted PHAR archive with an alias mismatch and cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
4) Buffer over-read (CVE-ID: CVE-2016-10161)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the object_common1 function in ext/standard/var_unserializer.c due to buffer over-read. A remote attacker can submit specially crafted serialized data that is mishandled in a finish_nested_data call and cause the service to crash.
5) Out-of-bounds read (CVE-ID: CVE-2016-9935)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the php_wddx_push_element function in ext/wddx/wddx.c due to out-of-bounds read. A remote attacker can submit an empty boolean element in a wddxPacket XML document and cause the service to crash.
Remediation
Install update from vendor's website.