openSUSE Security Update : php5 (openSUSE-2016-985)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for php5 fixes the following issues :

- security update :

- CVE-2016-6128: Invalid color index not properly handled

- CVE-2016-6161: global out of bounds read when encoding
gif from malformed input withgd2togif [bsc#988032]

- CVE-2016-6292: NULL pointer dereference in
exif_process_user_comment [bsc#991422]

- CVE-2016-6295: Use after free in SNMP with GC and
unserialize() [bsc#991424]

- CVE-2016-6297: Stack-based buffer overflow vulnerability
in php_stream_zip_opener [bsc#991426]

- CVE-2016-6291: Out-of-bounds access in
exif_process_IFD_in_MAKERNOTE [bsc#991427]

- CVE-2016-6289: Integer overflow leads to buffer overflow
in virtual_file_ex [bsc#991428]

- CVE-2016-6290: Use after free in unserialize() with
Unexpected Session Deserialization [bsc#991429]

- CVE-2016-5399: Improper error handling in bzread()

- CVE-2016-6296: Heap buffer overflow vulnerability in
simplestring_addn in simplestring.c [bsc#991437]

- CVE-2016-6207: Integer overflow error within
_gdContributionsAlloc() [bsc#991434]

- CVE-2016-6288: Buffer over-read in php_url_parse_ex

See also :

Solution :

Update the affected php5 packages.

Risk factor :

High / CVSS Base Score : 7.5

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now