Oracle Linux 7 : php (ELSA-2015-1135)

critical Nessus Plugin ID 84351

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2015-1135 advisory.

- core: fix multipart/form-data request can use excessive amount of CPU usage CVE-2015-4024
- fix various functions accept paths with NUL character CVE-2015-4025, CVE-2015-4026, #1213407
- ftp: fix integer overflow leading to heap overflow when reading FTP file listing CVE-2015-4022
- phar: fix buffer over-read in metadata parsing CVE-2015-2783
- phar: invalid pointer free() in phar_tar_process_metadata() CVE-2015-3307
- phar: fix buffer overflow in phar_set_inode() CVE-2015-3329
- phar: fix memory corruption in phar_parse_tarfile caused by empty entry file name CVE-2015-4021
- apache2handler: fix pipelined request executed in deinitialized interpreter under httpd 2.4 CVE-2015-3330
- core: use after free vulnerability in unserialize() CVE-2014-8142 and CVE-2015-0231
- core: fix use-after-free in unserialize CVE-2015-2787
- core: fix NUL byte injection in file name argument of move_uploaded_file() CVE-2015-2348
- date: use after free vulnerability in unserialize CVE-2015-0273
- enchant: fix heap buffer overflow in enchant_broker_request_dict CVE-2014-9705
- exif: free called on unitialized pointer CVE-2015-0232
- fileinfo: fix out of bounds read in mconvert CVE-2014-9652
- gd: fix buffer read overflow in gd_gif_in.c CVE-2014-9709
- phar: use after free in phar_object.c CVE-2015-2301
- fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
- xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
- core: fix integer overflow in unserialize() CVE-2014-3669
- exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
- gd: fix NULL pointer dereference in gdImageCreateFromXpm().
CVE-2014-2497
- gd: fix NUL byte injection in file names. CVE-2014-5120
- fileinfo: fix extensive backtracking in regular expression (incomplete fix for CVE-2013-7345). CVE-2014-3538
- fileinfo: fix mconvert incorrect handling of truncated pascal string size. CVE-2014-3478
- fileinfo: fix cdf_read_property_info (incomplete fix for CVE-2012-1571). CVE-2014-3587
- spl: fix use-after-free in ArrayIterator due to object change during sorting. CVE-2014-4698
- spl: fix use-after-free in SPL Iterators. CVE-2014-4670
- network: fix segfault in dns_get_record (incomplete fix for CVE-2014-4049). CVE-2014-3597

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2015-1135.html

Plugin Details

Severity: Critical

ID: 84351

File Name: oraclelinux_ELSA-2015-1135.nasl

Version: 2.16

Type: local

Agent: unix

Published: 6/24/2015

Updated: 10/22/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-4603

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:php-gd, p-cpe:/a:oracle:linux:php-mysql, p-cpe:/a:oracle:linux:php-odbc, p-cpe:/a:oracle:linux:php-process, p-cpe:/a:oracle:linux:php-xml, p-cpe:/a:oracle:linux:php-intl, p-cpe:/a:oracle:linux:php-mysqlnd, p-cpe:/a:oracle:linux:php-xmlrpc, p-cpe:/a:oracle:linux:php-mbstring, p-cpe:/a:oracle:linux:php-pgsql, p-cpe:/a:oracle:linux:php-pspell, p-cpe:/a:oracle:linux:php-ldap, p-cpe:/a:oracle:linux:php-devel, p-cpe:/a:oracle:linux:php-fpm, p-cpe:/a:oracle:linux:php-enchant, p-cpe:/a:oracle:linux:php-common, p-cpe:/a:oracle:linux:php-snmp, cpe:/o:oracle:linux:7, p-cpe:/a:oracle:linux:php-pdo, p-cpe:/a:oracle:linux:php-bcmath, p-cpe:/a:oracle:linux:php-recode, p-cpe:/a:oracle:linux:php-soap, p-cpe:/a:oracle:linux:php-embedded, p-cpe:/a:oracle:linux:php-cli, p-cpe:/a:oracle:linux:php-dba, p-cpe:/a:oracle:linux:php

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/23/2015

Vulnerability Publication Date: 12/20/2014

Reference Information

CVE: CVE-2014-8142, CVE-2014-9652, CVE-2014-9705, CVE-2014-9709, CVE-2015-0231, CVE-2015-0232, CVE-2015-0273, CVE-2015-2301, CVE-2015-2348, CVE-2015-2783, CVE-2015-2787, CVE-2015-3307, CVE-2015-3329, CVE-2015-3330, CVE-2015-3411, CVE-2015-3412, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4147, CVE-2015-4148, CVE-2015-4598, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604, CVE-2015-4605

BID: 71791, 72505, 72539, 72541, 72701, 73031, 73037, 73306, 73357, 73431, 73434, 74204, 74239, 74240, 74413, 74700, 74703, 74902, 74903, 74904, 75056, 75103, 75233, 75241, 75244, 75246, 75249, 75250, 75251, 75252, 75255

RHSA: 2015:1135