Executive Summary

Summary
Title PHP vulnerability
Informations
NameUSN-4166-2First vendor Publication2019-10-29
VendorUbuntuLast vendor Modification2019-10-29
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM

Summary:

PHP could be made to run programs if it received specially crafted network traffic.

Software Description: - php5: HTML-embedded scripting language interpreter

Details:

USN-4166-1 fixed a vulnerability in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that PHP incorrectly handled certain paths when being
used in FastCGI configurations. A remote attacker could possibly use this
issue to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm6
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm6

Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.40
php5-cgi 5.3.10-1ubuntu3.40
php5-cli 5.3.10-1ubuntu3.40
php5-fpm 5.3.10-1ubuntu3.40

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4166-2
https://usn.ubuntu.com/4166-1
CVE-2019-11043

Original Source

Url : http://www.ubuntu.com/usn/USN-4166-2

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-10-29 17:19:12
  • First insertion