PHP 7.0.x < 7.0.1 Multiple Vulnerabilities
Critical Nessus Network Monitor Plugin ID 9064
SynopsisThe remote web server uses a version of PHP that is affected by multiple vulnerabilities.
DescriptionVersions of PHP 7.0.x prior to 7.0.1 are vulnerable to the following issues :
- A use-after-free error exists in the 'collator_sort_with_sort_keys()' function in 'xt/intl/collator/collator_sort.c.' The issue is triggered as pointers are not properly cleared when destroying an array. This may allow a remote attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2015-8616)
- A format string flaw exists in the 'zend_throw_or_error()' function in 'Zend/zend_execute_API.c' as format string specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input such as when handling non-existent class names. This may allow an authenticated, remote attacker to potentially execute arbitrary code. (CVE-2015-8617)
- A flaw exists in the 'php_password_make_salt()' function in 'ext/standard/password.c' that is triggered when attempts to read random bytes from the operating system's cryptographically secure pseudo-random number generator (CSPRNG) fail. In such cases, the function falls back to generating the password salt in an insecure manner. This may allow an attacker to more easily predict the generated password salt.
SolutionUpgrade to PHP version 7.0.1, or later.