SUSE SLES11 Security Update : php53 (SUSE-SU-2017:0568-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for php53 fixes the following security issues :

- CVE-2016-7478: When unserializing untrusted input data,
PHP could end up in an infinite loop, causing denial of
service (bsc#1019550)

- CVE-2016-10158: The exif_convert_any_to_int function in
ext/exif/exif.c in PHP allowed remote attackers to cause
a denial of service (application crash) via crafted EXIF
data that triggers an attempt to divide the minimum
representable negative integer by -1. (bsc#1022219)

- CVE-2016-10159: Integer overflow in the
phar_parse_pharfile function in ext/phar/phar.c in PHP
allowed remote attackers to cause a denial of service
(memory consumption or application crash) via a
truncated manifest entry in a PHAR archive.
(bsc#1022255)

- CVE-2016-10160: Off-by-one error in the
phar_parse_pharfile function in ext/phar/phar.c in PHP
allowed remote attackers to cause a denial of service
(memory corruption) or possibly execute arbitrary code
via a crafted PHAR archive with an alias mismatch.
(bsc#1022257)

- CVE-2016-10161: The object_common1 function in
ext/standard/var_unserializer.c in PHP allowed remote
attackers to cause a denial of service (buffer over-read
and application crash) via crafted serialized data that
is mishandled in a finish_nested_data call.
(bsc#1022260)

- CVE-2016-10166: A potential unsigned underflow in gd
interpolation functions could lead to memory corruption
in the PHP gd module (bsc#1022263)

- CVE-2016-10167: A denial of service problem in
gdImageCreateFromGd2Ctx() could lead to php out of
memory even on small files. (bsc#1022264)

- CVE-2016-10168: A signed integer overflow in the gd
module could lead to memory corruption (bsc#1022265)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1019550
https://bugzilla.suse.com/1022219
https://bugzilla.suse.com/1022255
https://bugzilla.suse.com/1022257
https://bugzilla.suse.com/1022260
https://bugzilla.suse.com/1022263
https://bugzilla.suse.com/1022264
https://bugzilla.suse.com/1022265
https://www.suse.com/security/cve/CVE-2016-10158.html
https://www.suse.com/security/cve/CVE-2016-10159.html
https://www.suse.com/security/cve/CVE-2016-10160.html
https://www.suse.com/security/cve/CVE-2016-10161.html
https://www.suse.com/security/cve/CVE-2016-10166.html
https://www.suse.com/security/cve/CVE-2016-10167.html
https://www.suse.com/security/cve/CVE-2016-10168.html
https://www.suse.com/security/cve/CVE-2016-7478.html
http://www.nessus.org/u?3ce8f28f

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE OpenStack Cloud 5:zypper in -t patch sleclo50sp3-php53-12997=1

SUSE Manager Proxy 2.1:zypper in -t patch slemap21-php53-12997=1

SUSE Manager 2.1:zypper in -t patch sleman21-php53-12997=1

SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t
patch sdksp4-php53-12997=1

SUSE Linux Enterprise Server 11-SP4:zypper in -t patch
slessp4-php53-12997=1

SUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch
slessp3-php53-12997=1

SUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch
sleposp3-php53-12997=1

SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch
dbgsp4-php53-12997=1

SUSE Linux Enterprise Debuginfo 11-SP3:zypper in -t patch
dbgsp3-php53-12997=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 97431 ()

Bugtraq ID:

CVE ID: CVE-2016-10158
CVE-2016-10159
CVE-2016-10160
CVE-2016-10161
CVE-2016-10166
CVE-2016-10167
CVE-2016-10168
CVE-2016-7478

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now