Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title PHP vulnerabilities
Informations
NameUSN-3646-1First vendor Publication2018-05-14
VendorUbuntuLast vendor Modification2018-05-14
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description: - php7.2: HTML-embedded scripting language interpreter - php7.1: HTML-embedded scripting language interpreter - php7.0: HTML-embedded scripting language interpreter - php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled opcache access controls when configured to use PHP-FPM. A local user could possibly use this issue to obtain sensitive information from another user's PHP applications. (CVE-2018-10545)

It was discovered that the PHP iconv stream filter incorrect handled certain invalid multibyte sequences. A remote attacker could possibly use this issue to cause PHP to hang, resulting in a denial of service. (CVE-2018-10546)

It was discovered that the PHP PHAR error pages incorrectly filtered certain data. A remote attacker could possibly use this issue to perform a reflected XSS attack. (CVE-2018-10547)

It was discovered that PHP incorrectly handled LDAP. A malicious remote LDAP server could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2018-10548)

It was discovered that PHP incorrectly handled certain exif tags in JPEG images. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS. (CVE-2018-10549)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.5-0ubuntu0.18.04.1
php7.2-cgi 7.2.5-0ubuntu0.18.04.1
php7.2-cli 7.2.5-0ubuntu0.18.04.1
php7.2-fpm 7.2.5-0ubuntu0.18.04.1

Ubuntu 17.10:
libapache2-mod-php7.1 7.1.17-0ubuntu0.17.10.1
php7.1-cgi 7.1.17-0ubuntu0.17.10.1
php7.1-cli 7.1.17-0ubuntu0.17.10.1
php7.1-fpm 7.1.17-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.30-0ubuntu0.16.04.1
php7.0-cgi 7.0.30-0ubuntu0.16.04.1
php7.0-cli 7.0.30-0ubuntu0.16.04.1
php7.0-fpm 7.0.30-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.25
php5-cgi 5.5.9+dfsg-1ubuntu4.25
php5-cli 5.5.9+dfsg-1ubuntu4.25
php5-fpm 5.5.9+dfsg-1ubuntu4.25

In Ubuntu 16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS, this update uses a new upstream release, which includes additional bug fixes.

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3646-1
CVE-2018-10545, CVE-2018-10546, CVE-2018-10547, CVE-2018-10548,
CVE-2018-10549

Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.5-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/php7.1/7.1.17-0ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/php7.0/7.0.30-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.25

Original Source

Url : http://www.ubuntu.com/usn/USN-3646-1

CWE : Common Weakness Enumeration

%idName
25 %CWE-476NULL Pointer Dereference
25 %CWE-200Information Exposure
25 %CWE-125Out-of-bounds Read
25 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application791
Os5
Os3

Snort® IPS/IDS

DateDescription
2018-12-11CVE PHP infinite loop from use of stream filter and convert.iconv file upload...
RuleID : 48354 - Revision : 2 - Type : SERVER-WEBAPP
2018-06-26PHP .phar cross site scripting attempt
RuleID : 46808 - Revision : 2 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

DateDescription
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ee6707d519.nasl - Type : ACT_GATHER_INFO
2018-12-03Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201812-01.nasl - Type : ACT_GATHER_INFO
2018-10-26Name : The remote EulerOS Virtualization host is missing a security update.
File : EulerOS_SA-2018-1325.nasl - Type : ACT_GATHER_INFO
2018-09-27Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1309.nasl - Type : ACT_GATHER_INFO
2018-09-27Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1310.nasl - Type : ACT_GATHER_INFO
2018-08-10Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1224.nasl - Type : ACT_GATHER_INFO
2018-07-06Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4240.nasl - Type : ACT_GATHER_INFO
2018-07-03Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2018-1217.nasl - Type : ACT_GATHER_INFO
2018-06-27Name : The remote Debian host is missing a security update.
File : debian_DLA-1397.nasl - Type : ACT_GATHER_INFO
2018-05-17Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2018-136-02.nasl - Type : ACT_GATHER_INFO
2018-05-11Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2018-1019.nasl - Type : ACT_GATHER_INFO
2018-05-10Name : The remote Debian host is missing a security update.
File : debian_DLA-1373.nasl - Type : ACT_GATHER_INFO
2018-05-04Name : The remote Fedora host is missing a security update.
File : fedora_2018-04f6056c42.nasl - Type : ACT_GATHER_INFO
2018-05-04Name : The remote Fedora host is missing a security update.
File : fedora_2018-6071a600e8.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2018-06-06 17:21:18
  • Multiple Updates
2018-06-06 00:21:31
  • Multiple Updates
2018-05-18 09:21:20
  • Multiple Updates
2018-05-14 21:19:16
  • First insertion