Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

PHP < 7.1.0 Multiple Vulnerabilities

Critical

Synopsis

The remote web server uses a version of PHP that is affected by multiple attack vectors.

Description

Versions of PHP prior to 7.1.0 are vulnerable to the following issues :

- A flaw exists that is due to 'parse_url' returning the incorrect host. This may allow a remote attacker to have an impact that may include bypassing authentication, or conducting open redirection and server-side request forgery attacks, depending on how the function is implemented. (OSVDB 145227) - An overflow condition exists in the 'dynamicGetbuf()' function in 'gd_io_dp.c'. The issue is triggered as certain input is not properly validated. With a specially crafted string, a remote attacker can cause a stack-based buffer overflow, resulting in a denial of service in a process utilizing the language or potentially allowing the execution of arbitrary code. (OSVDB 145715) - A use-after-free error exists in the 'unserialize()' function related to uses of '__wakeup' which modify properties. This may allow a remote attacker to dereference already freed memory and potentially execute arbitrary code. (OSVDB 146579) - A use-after-free error exists that is triggered when handling unserialized object properties. With a specially crafted request, a remote attacker can dereference already freed memory and potentially execute arbitrary code. (OSVDB 149442)

Solution

Upgrade to PHP version 7.1.0 or later.