openSUSE Security Update : php5 (openSUSE-2016-921) (httpoxy)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for php5 fixes the following issues :

- It is possible to launch a web server with 'php -S
localhost:8080' It used to be possible to set an
arbitrary $HTTP_PROXY environment variable for request
handlers -- like CGI scripts -- by including a specially
crafted HTTP header in the request (CVE-2016-5385). As a
result, these server components would potentially direct
all their outgoing HTTP traffic through a malicious
proxy server. This patch fixes the issue: the updated
php server ignores such HTTP headers and never sets
$HTTP_PROXY for sub-processes. (bnc#988486)

- There was multiple cases where a remote attacker could
trigger a double free and, given specific PHP code using
callbacks, trigger code execution vectors.
(bnc#986246,bnc#986244,CVE-2016-5768,CVE-2016-5772)

- It was possible to inject header or content information
(XSS) when a user was using internet explorer as the
browser. (bnc#986004, CVE-2015-8935)

- In several cases it was possible for a integer overflow
to trigger an excessive memory allocation (bnc#986392,
bnc#986388, bnc#986386, bnc#986393, CVE-2016-5770,
CVE-2016-5769, CVE-2016-5766, CVE-2016-5767)

- It was possible for an attacker to abuse the garbage
collector to free a target array. At this point an
attacker could craft a fake zval object and exploit the
PHP process by taking over the EIP/RIP. (bnc#986391,
CVE-2016-5771)

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=986004
https://bugzilla.opensuse.org/show_bug.cgi?id=986244
https://bugzilla.opensuse.org/show_bug.cgi?id=986246
https://bugzilla.opensuse.org/show_bug.cgi?id=986386
https://bugzilla.opensuse.org/show_bug.cgi?id=986388
https://bugzilla.opensuse.org/show_bug.cgi?id=986391
https://bugzilla.opensuse.org/show_bug.cgi?id=986392
https://bugzilla.opensuse.org/show_bug.cgi?id=986393
https://bugzilla.opensuse.org/show_bug.cgi?id=988486

Solution :

Update the affected php5 packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 92714 ()

Bugtraq ID:

CVE ID: CVE-2015-8935
CVE-2016-5385
CVE-2016-5766
CVE-2016-5767
CVE-2016-5768
CVE-2016-5769
CVE-2016-5770
CVE-2016-5771
CVE-2016-5772

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now