Executive Summary

Summary
Title PHP vulnerabilities
Informations
NameUSN-3902-1First vendor Publication2019-03-06
VendorUbuntuLast vendor Modification2019-03-06
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description: - php7.0: HTML-embedded scripting language interpreter - php5: HTML-embedded scripting language interpreter

Details:

It was discovered that the PHP XML-RPC module incorrectly handled decoding XML data. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2019-9020, CVE-2019-9024)

It was discovered that the PHP PHAR module incorrectly handled certain filenames. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2019-9021)

It was discovered that PHP incorrectly parsed certain DNS responses. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2019-9022)

It was discovered that PHP incorrectly handled mbstring regular expressions. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2019-9023)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.2
php7.0-cgi 7.0.33-0ubuntu0.16.04.2
php7.0-cli 7.0.33-0ubuntu0.16.04.2
php7.0-fpm 7.0.33-0ubuntu0.16.04.2
php7.0-mbstring 7.0.33-0ubuntu0.16.04.2
php7.0-xmlrpc 7.0.33-0ubuntu0.16.04.2

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.27
php5-cgi 5.5.9+dfsg-1ubuntu4.27
php5-cli 5.5.9+dfsg-1ubuntu4.27
php5-fpm 5.5.9+dfsg-1ubuntu4.27
php5-xmlrpc 5.5.9+dfsg-1ubuntu4.27

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3902-1
CVE-2019-9020, CVE-2019-9021, CVE-2019-9022, CVE-2019-9023,
CVE-2019-9024

Package Information:
https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.27

Original Source

Url : http://www.ubuntu.com/usn/USN-3902-1

CWE : Common Weakness Enumeration

%idName
83 %CWE-125Out-of-bounds Read
17 %CWE-416Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application375
Os3
Os1

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-03-13 13:21:58
  • Multiple Updates
2019-03-06 17:18:36
  • First insertion