Amazon Linux AMI : php56 / php70,php71,php72 (ALAS-2019-1147)
High Nessus Plugin ID 121132
SynopsisThe remote Amazon Linux AMI host is missing a security update.
Descriptionext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.(CVE-2018-19935)
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a '-oProxyCommand' argument.(CVE-2018-19518)
SolutionRun 'yum update php56' to update your system.
Run 'yum update php70' to update your system.
Run 'yum update php71' to update your system.
Run 'yum update php72' to update your system.