[arch-security] [ASA-201501-17] php: remote code execution
rgacogne at archlinux.org
Fri Jan 23 13:51:34 UTC 2015
Arch Linux Security Advisory ASA-201501-17
Date : 2015-01-23
CVE-ID : CVE-2014-9427 CVE-2015-0231 CVE-2015-0232
Package : php
Type : remote code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package php before version 5.6.5-1 is vulnerable to arbitrary remote
Upgrade to 5.6.5-1.
# pacman -Syu "php>=5.6.5-1"
The problem has been fixed upstream in version 5.6.5.
- CVE-2014-9427 (information leak, remote code execution)
A one-byte file containing only the '#' character, not followed by any
newline, causes php-cgi to do an out of bound read, potentially
disclosing sensitive information present in memory or even triggering
code execution if adjacent memory location contains valid PHP code.
- CVE-2015-0231 (remote code execution)
A use-after-free vulnerability in unserialize() allows a remote attacker
to execute arbitrary code. This vulnerability results from an incomplete
fix for CVE-2014-8142.
- CVE-2015-0232 (remote code execution)
An attempt to free an uninitialized pointer may result in arbitrary code
execution while parsing exif information from a carefully crafted file.
A remote attacker may be able to execute arbitrary code on the affected
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security