openSUSE Security Update : php7 (openSUSE-2017-994)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for php7 fixes the following issues :

- CVE-2016-10397: parse_url() can be bypassed to return
fake host. (bsc#1047454)

- CVE-2017-11142: Remoteattackers could cause a CPU
consumption denial of service attack by injectinglong
form variables, related to main/php_variables.
(bsc#1048100)

- CVE-2017-11144: The opensslextension PEM sealing code
did not check the return value of the OpenSSL
sealingfunction, which could lead to a crash.
(bsc#1048096)

- CVE-2017-11145: Lack of bounds checks in
timelib_meridian coud lead to information leak.
(bsc#1048112)

- CVE-2017-11146: Lack of bounds checks in
timelib_meridian parse code could lead to information
leak. (bsc#1048111)

- CVE-2017-11147: The PHAR archive handler could beused by
attackers supplying malicious archive files to crash the
PHP interpreteror potentially disclose information.
(bsc#1048094)

- CVE-2017-11628: Stack-base dbuffer overflow in
zend_ini_do_op() could lead to denial of service
(bsc#1050726)

- CVE-2017-7890: Buffer over-read from uninitialized data
in gdImageCreateFromGifCtx function could lead to denial
of service (bsc#1050241)

- CVE-2016-5766: Integer Overflow in _gd2GetHeader()
resulting in heap overflow could lead to denial of
service or code execution (bsc#986386)

Other fixes :

- Soap Request with References (bsc#1053645)

- php7-pear should explicitly require
php7-pear-Archive_Tar otherwise this dependency must be
declared in every php7-pear-* package explicitly.
[bnc#1052389]

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1047454
https://bugzilla.opensuse.org/show_bug.cgi?id=1048094
https://bugzilla.opensuse.org/show_bug.cgi?id=1048096
https://bugzilla.opensuse.org/show_bug.cgi?id=1048100
https://bugzilla.opensuse.org/show_bug.cgi?id=1048111
https://bugzilla.opensuse.org/show_bug.cgi?id=1048112
https://bugzilla.opensuse.org/show_bug.cgi?id=1050241
https://bugzilla.opensuse.org/show_bug.cgi?id=1050726
https://bugzilla.opensuse.org/show_bug.cgi?id=1052389
https://bugzilla.opensuse.org/show_bug.cgi?id=1053645
https://bugzilla.opensuse.org/show_bug.cgi?id=986386

Solution :

Update the affected php7 packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 102947 ()

Bugtraq ID:

CVE ID: CVE-2016-10397
CVE-2016-5766
CVE-2017-11142
CVE-2017-11144
CVE-2017-11145
CVE-2017-11146
CVE-2017-11147
CVE-2017-11628
CVE-2017-7890

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now