PHP Multiple Remote Code Execution Vulnerabilities
Last Update Date:
20 Mar 2015 10:44
Release Date:
20 Mar 2015
3700
Views
RISK: High Risk
TYPE: Servers - Web Servers
Multiple vulnerabilities were identified in PHP. A remote user can execute arbitrary code on the target system.
- A remote user can send specially crafted data to an application to trigger a use-after-free memory error in the unserialisation of objects in the DateTimeZone class.
- A remote user can send specially crafted data to trigger a memory handling error in the phar extension and potentially execute arbitrary code on the target system.
- A remote user can send specially crafted data to an application to trigger a heap overflow in the ereg extension and execute arbitrary code on the target system. The vulnerability resides in the Henry Spencer regex library. Only 32-bit systems are affected.
Impact
- Remote Code Execution
System / Technologies affected
- PHP prior to versions 5.4.38, 5.5.22, 5.6.6
- 32-bit PHP
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 5.4.38, 5.5.22, 5.6.6
- No official solution is currently available for 32-bit PHP.
Vulnerability Identifier
Source
Related Link
Share with