Scientific Linux Security Update : php on SL7.x x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Security Fix(es) :

- A flaw was found in the way certain error conditions
were handled by bzread() function in PHP. An attacker
could use this flaw to upload a specially crafted bz2
archive which, when parsed via the vulnerable function,
could cause the application to crash or execute
arbitrary code with the permissions of the user running
the PHP application. (CVE-2016-5399)

- An integer overflow flaw, leading to a heap-based buffer
overflow was found in the imagecreatefromgd2() function
of PHP's gd extension. A remote attacker could use this
flaw to crash a PHP application or execute arbitrary
code with the privileges of the user running that PHP
application using gd via a specially crafted GD2 image.
(CVE-2016-5766)

- An integer overflow flaw, leading to a heap-based buffer
overflow was found in the gdImagePaletteToTrueColor()
function of PHP's gd extension. A remote attacker could
use this flaw to crash a PHP application or execute
arbitrary code with the privileges of the user running
that PHP application using gd via a specially crafted
image buffer. (CVE-2016-5767)

- A double free flaw was found in the
mb_ereg_replace_callback() function of php which is used
to perform regex search. This flaw could possibly cause
a PHP application to crash. (CVE-2016-5768)

Additional Changes :

See also :

http://www.nessus.org/u?df28f3cc

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 95854 ()

Bugtraq ID:

CVE ID: CVE-2016-5399
CVE-2016-5766
CVE-2016-5767
CVE-2016-5768

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now