RHEL 6 / 7 : php54-php (RHSA-2015:1219)

critical Nessus Plugin ID 234421

Synopsis

The remote Red Hat host is missing one or more security updates for php54-php.

Description

The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2015:1219 advisory.

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024)

An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022)

It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4025, CVE-2015-4026, CVE-2015-4598)

An integer underflow flaw leading to out-of-bounds memory access was found in the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-4021)

All php54-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd service must be restarted for the update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL php54-php package based on the guidance in RHSA-2015:1219.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1222485

https://bugzilla.redhat.com/show_bug.cgi?id=1223408

https://bugzilla.redhat.com/show_bug.cgi?id=1223412

https://bugzilla.redhat.com/show_bug.cgi?id=1223422

https://bugzilla.redhat.com/show_bug.cgi?id=1223425

https://bugzilla.redhat.com/show_bug.cgi?id=1232897

http://www.nessus.org/u?0e083347

https://access.redhat.com/errata/RHSA-2015:1219

Plugin Details

Severity: Critical

ID: 234421

File Name: redhat-RHSA-2015-1219.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/15/2025

Updated: 4/15/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-4643

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:php54-php-soap, p-cpe:/a:redhat:enterprise_linux:php54-php-bcmath, p-cpe:/a:redhat:enterprise_linux:php54-php-pdo, p-cpe:/a:redhat:enterprise_linux:php54-php-fpm, p-cpe:/a:redhat:enterprise_linux:php54-php-mbstring, p-cpe:/a:redhat:enterprise_linux:php54-php, p-cpe:/a:redhat:enterprise_linux:php54-php-cli, p-cpe:/a:redhat:enterprise_linux:php54-php-common, p-cpe:/a:redhat:enterprise_linux:php54-php-gd, p-cpe:/a:redhat:enterprise_linux:php54-php-odbc, p-cpe:/a:redhat:enterprise_linux:php54-php-dba, p-cpe:/a:redhat:enterprise_linux:php54-php-devel, p-cpe:/a:redhat:enterprise_linux:php54-php-pgsql, p-cpe:/a:redhat:enterprise_linux:php54-php-pspell, p-cpe:/a:redhat:enterprise_linux:php54-php-snmp, p-cpe:/a:redhat:enterprise_linux:php54-php-imap, p-cpe:/a:redhat:enterprise_linux:php54-php-mysqlnd, p-cpe:/a:redhat:enterprise_linux:php54-php-recode, p-cpe:/a:redhat:enterprise_linux:php54-php-tidy, p-cpe:/a:redhat:enterprise_linux:php54-php-intl, p-cpe:/a:redhat:enterprise_linux:php54-php-enchant, p-cpe:/a:redhat:enterprise_linux:php54-php-ldap, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:php54-php-xml, p-cpe:/a:redhat:enterprise_linux:php54-php-xmlrpc, p-cpe:/a:redhat:enterprise_linux:php54-php-process

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/9/2015

Vulnerability Publication Date: 5/12/2015

Reference Information

CVE: CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4598, CVE-2015-4643, CVE-2015-4644

CWE: 122, 190, 407, 476, 626, 787

RHSA: 2015:1219