Amazon Linux AMI : php56 / php70,php71 (ALAS-2018-1019)

high Nessus Plugin ID 109701

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

NULL pointer dereference due to mishandling of ldap_get_dn return value allows denial-of-service by malicious LDAP server or man-in-the-middle attacker

An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.(CVE-2018-10548)

Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service

An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.(CVE-2018-10546)

Reflected XSS vulnerability on PHAR 403 and 404 error pages

An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712 .(CVE-2018-10547)

Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading crafted JPEG data

An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.(CVE-2018-10549)

Solution

Run 'yum update php56' to update your system.

Run 'yum update php70' to update your system.

Run 'yum update php71' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2018-1019.html

Plugin Details

Severity: High

ID: 109701

File Name: ala_ALAS-2018-1019.nasl

Version: 1.8

Type: local

Agent: unix

Published: 5/11/2018

Updated: 10/9/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-10549

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:php56-imap, p-cpe:/a:amazon:linux:php70-pdo-dblib, p-cpe:/a:amazon:linux:php56-opcache, p-cpe:/a:amazon:linux:php70-imap, p-cpe:/a:amazon:linux:php71-pdo, p-cpe:/a:amazon:linux:php70-devel, p-cpe:/a:amazon:linux:php71-soap, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:php56-gmp, p-cpe:/a:amazon:linux:php56-enchant, p-cpe:/a:amazon:linux:php71-mcrypt, p-cpe:/a:amazon:linux:php56-odbc, p-cpe:/a:amazon:linux:php71-common, p-cpe:/a:amazon:linux:php70-embedded, p-cpe:/a:amazon:linux:php71-json, p-cpe:/a:amazon:linux:php71-ldap, p-cpe:/a:amazon:linux:php56-cli, p-cpe:/a:amazon:linux:php70-dbg, p-cpe:/a:amazon:linux:php56-dba, p-cpe:/a:amazon:linux:php56-gd, p-cpe:/a:amazon:linux:php56-devel, p-cpe:/a:amazon:linux:php70-snmp, p-cpe:/a:amazon:linux:php56-snmp, p-cpe:/a:amazon:linux:php71-mbstring, p-cpe:/a:amazon:linux:php70-intl, p-cpe:/a:amazon:linux:php70-debuginfo, p-cpe:/a:amazon:linux:php70-mbstring, p-cpe:/a:amazon:linux:php70-pspell, p-cpe:/a:amazon:linux:php70, p-cpe:/a:amazon:linux:php70-cli, p-cpe:/a:amazon:linux:php71-pspell, p-cpe:/a:amazon:linux:php71-bcmath, p-cpe:/a:amazon:linux:php56-recode, p-cpe:/a:amazon:linux:php56-xml, p-cpe:/a:amazon:linux:php71-snmp, p-cpe:/a:amazon:linux:php71-tidy, p-cpe:/a:amazon:linux:php56-dbg, p-cpe:/a:amazon:linux:php56-embedded, p-cpe:/a:amazon:linux:php70-dba, p-cpe:/a:amazon:linux:php70-mcrypt, p-cpe:/a:amazon:linux:php70-opcache, p-cpe:/a:amazon:linux:php71-imap, p-cpe:/a:amazon:linux:php71-xmlrpc, p-cpe:/a:amazon:linux:php71-opcache, p-cpe:/a:amazon:linux:php70-gmp, p-cpe:/a:amazon:linux:php71-recode, p-cpe:/a:amazon:linux:php71-enchant, p-cpe:/a:amazon:linux:php56-process, p-cpe:/a:amazon:linux:php71-process, p-cpe:/a:amazon:linux:php70-xml, p-cpe:/a:amazon:linux:php71-dbg, p-cpe:/a:amazon:linux:php56-xmlrpc, p-cpe:/a:amazon:linux:php71-gmp, p-cpe:/a:amazon:linux:php56-ldap, p-cpe:/a:amazon:linux:php71-pdo-dblib, p-cpe:/a:amazon:linux:php71-intl, p-cpe:/a:amazon:linux:php56-pdo, p-cpe:/a:amazon:linux:php70-gd, p-cpe:/a:amazon:linux:php56-common, p-cpe:/a:amazon:linux:php71-gd, p-cpe:/a:amazon:linux:php70-fpm, p-cpe:/a:amazon:linux:php71-debuginfo, p-cpe:/a:amazon:linux:php70-recode, p-cpe:/a:amazon:linux:php71-fpm, p-cpe:/a:amazon:linux:php56-debuginfo, p-cpe:/a:amazon:linux:php70-tidy, p-cpe:/a:amazon:linux:php71-dba, p-cpe:/a:amazon:linux:php70-enchant, p-cpe:/a:amazon:linux:php70-json, p-cpe:/a:amazon:linux:php70-process, p-cpe:/a:amazon:linux:php70-zip, p-cpe:/a:amazon:linux:php56-fpm, p-cpe:/a:amazon:linux:php56-bcmath, p-cpe:/a:amazon:linux:php56-mssql, p-cpe:/a:amazon:linux:php70-xmlrpc, p-cpe:/a:amazon:linux:php70-common, p-cpe:/a:amazon:linux:php56-mcrypt, p-cpe:/a:amazon:linux:php71-pgsql, p-cpe:/a:amazon:linux:php56-soap, p-cpe:/a:amazon:linux:php71-cli, p-cpe:/a:amazon:linux:php70-pgsql, p-cpe:/a:amazon:linux:php71, p-cpe:/a:amazon:linux:php56-mbstring, p-cpe:/a:amazon:linux:php70-mysqlnd, p-cpe:/a:amazon:linux:php56, p-cpe:/a:amazon:linux:php71-embedded, p-cpe:/a:amazon:linux:php71-devel, p-cpe:/a:amazon:linux:php70-odbc, p-cpe:/a:amazon:linux:php56-mysqlnd, p-cpe:/a:amazon:linux:php70-pdo, p-cpe:/a:amazon:linux:php70-soap, p-cpe:/a:amazon:linux:php71-xml, p-cpe:/a:amazon:linux:php71-odbc, p-cpe:/a:amazon:linux:php70-bcmath, p-cpe:/a:amazon:linux:php71-mysqlnd, p-cpe:/a:amazon:linux:php56-tidy, p-cpe:/a:amazon:linux:php70-ldap, p-cpe:/a:amazon:linux:php56-intl, p-cpe:/a:amazon:linux:php56-pgsql, p-cpe:/a:amazon:linux:php56-pspell

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/10/2018

Reference Information

CVE: CVE-2018-10546, CVE-2018-10547, CVE-2018-10548, CVE-2018-10549

ALAS: 2018-1019