Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU10335
Risk: Low
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-8923
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation in zend_string_extend() function in Zend/zend_string.h when leveraging a script's use of ".=" with a long. The application does not prevent changes to string objects that can result in a negative length. A remote attacker can pass an overly long string to script, which uses ".=" operand on the supplied data and trigger application crash.
Update the affected package php74 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications: 12-SP3 - 12-SP5
SUSE Linux Enterprise High Performance Computing: 12
SUSE Linux Enterprise Server: 12-SP2-LTSS-ERICSSON - 12-SP5
SUSE Linux Enterprise Module for Web Scripting: 12
SUSE Linux Enterprise Software Development Kit: 12-SP5
php74-zlib-debuginfo: before 7.4.6-1.33.1
php74-zlib: before 7.4.6-1.33.1
php74-zip-debuginfo: before 7.4.6-1.33.1
php74-zip: before 7.4.6-1.33.1
php74-xsl-debuginfo: before 7.4.6-1.33.1
php74-xsl: before 7.4.6-1.33.1
php74-xmlwriter-debuginfo: before 7.4.6-1.33.1
php74-xmlwriter: before 7.4.6-1.33.1
php74-xmlrpc-debuginfo: before 7.4.6-1.33.1
php74-xmlrpc: before 7.4.6-1.33.1
php74-xmlreader-debuginfo: before 7.4.6-1.33.1
php74-xmlreader: before 7.4.6-1.33.1
php74-tokenizer-debuginfo: before 7.4.6-1.33.1
php74-tokenizer: before 7.4.6-1.33.1
php74-tidy-debuginfo: before 7.4.6-1.33.1
php74-tidy: before 7.4.6-1.33.1
php74-sysvshm-debuginfo: before 7.4.6-1.33.1
php74-sysvshm: before 7.4.6-1.33.1
php74-sysvsem-debuginfo: before 7.4.6-1.33.1
php74-sysvsem: before 7.4.6-1.33.1
php74-sysvmsg-debuginfo: before 7.4.6-1.33.1
php74-sysvmsg: before 7.4.6-1.33.1
php74-sqlite-debuginfo: before 7.4.6-1.33.1
php74-sqlite: before 7.4.6-1.33.1
php74-sodium-debuginfo: before 7.4.6-1.33.1
php74-sodium: before 7.4.6-1.33.1
php74-sockets-debuginfo: before 7.4.6-1.33.1
php74-sockets: before 7.4.6-1.33.1
php74-soap-debuginfo: before 7.4.6-1.33.1
php74-soap: before 7.4.6-1.33.1
php74-snmp-debuginfo: before 7.4.6-1.33.1
php74-snmp: before 7.4.6-1.33.1
php74-shmop-debuginfo: before 7.4.6-1.33.1
php74-shmop: before 7.4.6-1.33.1
php74-readline-debuginfo: before 7.4.6-1.33.1
php74-readline: before 7.4.6-1.33.1
php74-posix-debuginfo: before 7.4.6-1.33.1
php74-posix: before 7.4.6-1.33.1
php74-phar-debuginfo: before 7.4.6-1.33.1
php74-phar: before 7.4.6-1.33.1
php74-pgsql-debuginfo: before 7.4.6-1.33.1
php74-pgsql: before 7.4.6-1.33.1
php74-pdo-debuginfo: before 7.4.6-1.33.1
php74-pdo: before 7.4.6-1.33.1
php74-pcntl-debuginfo: before 7.4.6-1.33.1
php74-pcntl: before 7.4.6-1.33.1
php74-openssl-debuginfo: before 7.4.6-1.33.1
php74-openssl: before 7.4.6-1.33.1
php74-opcache-debuginfo: before 7.4.6-1.33.1
php74-opcache: before 7.4.6-1.33.1
php74-odbc-debuginfo: before 7.4.6-1.33.1
php74-odbc: before 7.4.6-1.33.1
php74-mysql-debuginfo: before 7.4.6-1.33.1
php74-mysql: before 7.4.6-1.33.1
php74-mbstring-debuginfo: before 7.4.6-1.33.1
php74-mbstring: before 7.4.6-1.33.1
php74-ldap-debuginfo: before 7.4.6-1.33.1
php74-ldap: before 7.4.6-1.33.1
php74-json-debuginfo: before 7.4.6-1.33.1
php74-json: before 7.4.6-1.33.1
php74-intl-debuginfo: before 7.4.6-1.33.1
php74-intl: before 7.4.6-1.33.1
php74-iconv-debuginfo: before 7.4.6-1.33.1
php74-iconv: before 7.4.6-1.33.1
php74-gmp-debuginfo: before 7.4.6-1.33.1
php74-gmp: before 7.4.6-1.33.1
php74-gettext-debuginfo: before 7.4.6-1.33.1
php74-gettext: before 7.4.6-1.33.1
php74-gd-debuginfo: before 7.4.6-1.33.1
php74-gd: before 7.4.6-1.33.1
php74-ftp-debuginfo: before 7.4.6-1.33.1
php74-ftp: before 7.4.6-1.33.1
php74-fpm-debuginfo: before 7.4.6-1.33.1
php74-fpm: before 7.4.6-1.33.1
php74-fileinfo-debuginfo: before 7.4.6-1.33.1
php74-fileinfo: before 7.4.6-1.33.1
php74-fastcgi-debuginfo: before 7.4.6-1.33.1
php74-fastcgi: before 7.4.6-1.33.1
php74-exif-debuginfo: before 7.4.6-1.33.1
php74-exif: before 7.4.6-1.33.1
php74-enchant-debuginfo: before 7.4.6-1.33.1
php74-enchant: before 7.4.6-1.33.1
php74-dom-debuginfo: before 7.4.6-1.33.1
php74-dom: before 7.4.6-1.33.1
php74-dba-debuginfo: before 7.4.6-1.33.1
php74-dba: before 7.4.6-1.33.1
php74-curl-debuginfo: before 7.4.6-1.33.1
php74-curl: before 7.4.6-1.33.1
php74-ctype-debuginfo: before 7.4.6-1.33.1
php74-ctype: before 7.4.6-1.33.1
php74-calendar-debuginfo: before 7.4.6-1.33.1
php74-calendar: before 7.4.6-1.33.1
php74-bz2-debuginfo: before 7.4.6-1.33.1
php74-bz2: before 7.4.6-1.33.1
php74-bcmath-debuginfo: before 7.4.6-1.33.1
php74-bcmath: before 7.4.6-1.33.1
php74: before 7.4.6-1.33.1
apache2-mod_php74-debuginfo: before 7.4.6-1.33.1
apache2-mod_php74: before 7.4.6-1.33.1
php74-devel: before 7.4.6-1.33.1
php74-debugsource: before 7.4.6-1.33.1
php74-debuginfo: before 7.4.6-1.33.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20220530-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.