Amazon Linux AMI : php54 (ALAS-2016-670)

High Nessus Plugin ID 89967

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

A NULL pointer dereference flaw was found in the XSLTProcessor class in PHP. An attacker could use this flaw to cause a PHP application to crash if it performed Extensible Stylesheet Language (XSL) transformations using untrusted XSLT files and allowed the use of PHP functions to be used as XSLT functions within XSL stylesheets.
(CVE-2015-6837 , CVE-2015-6838)

A flaw was discovered in the way PHP performed object unserialization.
Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code.
(CVE-2015-6834 , CVE-2015-6835 , CVE-2015-6836)

Solution

Run 'yum update php54' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2016-670.html

Plugin Details

Severity: High

ID: 89967

File Name: ala_ALAS-2016-670.nasl

Version: 2.4

Type: local

Agent: unix

Published: 2016/03/17

Updated: 2019/04/11

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:php54, p-cpe:/a:amazon:linux:php54-bcmath, p-cpe:/a:amazon:linux:php54-cli, p-cpe:/a:amazon:linux:php54-common, p-cpe:/a:amazon:linux:php54-dba, p-cpe:/a:amazon:linux:php54-debuginfo, p-cpe:/a:amazon:linux:php54-devel, p-cpe:/a:amazon:linux:php54-embedded, p-cpe:/a:amazon:linux:php54-enchant, p-cpe:/a:amazon:linux:php54-fpm, p-cpe:/a:amazon:linux:php54-gd, p-cpe:/a:amazon:linux:php54-imap, p-cpe:/a:amazon:linux:php54-intl, p-cpe:/a:amazon:linux:php54-ldap, p-cpe:/a:amazon:linux:php54-mbstring, p-cpe:/a:amazon:linux:php54-mcrypt, p-cpe:/a:amazon:linux:php54-mssql, p-cpe:/a:amazon:linux:php54-mysql, p-cpe:/a:amazon:linux:php54-mysqlnd, p-cpe:/a:amazon:linux:php54-odbc, p-cpe:/a:amazon:linux:php54-pdo, p-cpe:/a:amazon:linux:php54-pgsql, p-cpe:/a:amazon:linux:php54-process, p-cpe:/a:amazon:linux:php54-pspell, p-cpe:/a:amazon:linux:php54-recode, p-cpe:/a:amazon:linux:php54-snmp, p-cpe:/a:amazon:linux:php54-soap, p-cpe:/a:amazon:linux:php54-tidy, p-cpe:/a:amazon:linux:php54-xml, p-cpe:/a:amazon:linux:php54-xmlrpc, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/03/16

Reference Information

CVE: CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838

ALAS: 2016-670