USN-2344-1: PHP vulnerabilities
10 September 2014
php5 could be made to crash or run programs if it received specially crafted network traffic.
Releases
Packages
- php5 - HTML-embedded scripting language interpreter
Details
It was discovered that the Fileinfo component in php5 contains an integer
overflow. An attacker could use this flaw to cause a denial of service
or possibly execute arbitrary code via a crafted CDF file. (CVE-2014-3587)
It was discovered that the php_parserr function contains multiple buffer
overflows. An attacker could use this flaw to cause a denial of service
or possibly execute arbitrary code via crafted DNS records. (CVE-2014-3597)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
libapache2-mod-php5
-
5.5.9+dfsg-1ubuntu4.4
-
php5
-
5.5.9+dfsg-1ubuntu4.4
-
php5-cgi
-
5.5.9+dfsg-1ubuntu4.4
-
php5-fpm
-
5.5.9+dfsg-1ubuntu4.4
Ubuntu 12.04
-
libapache2-mod-php5
-
5.3.10-1ubuntu3.14
-
php5
-
5.3.10-1ubuntu3.14
-
php5-cgi
-
5.3.10-1ubuntu3.14
-
php5-fpm
-
5.3.10-1ubuntu3.14
Ubuntu 10.04
After a standard system update you need to restart Apache or
php5-fpm to make all the necessary changes.
References
Related notices
- USN-2369-1: python-magic, libmagic1, python3-magic, libmagic-dev, file