openSUSE Security Update : php5 (openSUSE-2015-282)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

PHP was updated to fix several security issues.

The following vulnerabilities were fixed :

- A specially crafted GIF file could cause a buffer read
overflow in php-gd (CVE-2014-9709 bnc#923946)

- Memory was use after it was freed in PHAR (CVE-2015-2301
bnc#922022)

- heap overflow vulnerability in regcomp.c (CVE-2015-2305
bnc#922452)

- heap buffer overflow in Enchant (CVE-2014-9705
bnc#922451)

For openSUSE 13.2, the following additional vulnerability was fixed :

- A specially crafted zip file could lead to writing past
the heap boundary (CVE-2015-2331 bnc#922894)

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=922022
https://bugzilla.opensuse.org/show_bug.cgi?id=922451
https://bugzilla.opensuse.org/show_bug.cgi?id=922452
https://bugzilla.opensuse.org/show_bug.cgi?id=922894
https://bugzilla.opensuse.org/show_bug.cgi?id=923946

Solution :

Update the affected php5 packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 82516 ()

Bugtraq ID:

CVE ID: CVE-2014-9705
CVE-2014-9709
CVE-2015-2301
CVE-2015-2305
CVE-2015-2331

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now