Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

PHP 7.0.x < 7.0.1 Multiple Vulnerabilities

Critical

Synopsis

The remote web server uses a version of PHP that is affected by multiple vulnerabilities.

Description

Versions of PHP 7.0.x prior to 7.0.1 are vulnerable to the following issues :

- A use-after-free error exists in the 'collator_sort_with_sort_keys()' function in 'xt/intl/collator/collator_sort.c.' The issue is triggered as pointers are not properly cleared when destroying an array. This may allow a remote attacker to dereference already freed memory and potentially execute arbitrary code. (CVE-2015-8616) - A format string flaw exists in the 'zend_throw_or_error()' function in 'Zend/zend_execute_API.c' as format string specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input such as when handling non-existent class names. This may allow an authenticated, remote attacker to potentially execute arbitrary code. (CVE-2015-8617) - A flaw exists in the 'php_password_make_salt()' function in 'ext/standard/password.c' that is triggered when attempts to read random bytes from the operating system's cryptographically secure pseudo-random number generator (CSPRNG) fail. In such cases, the function falls back to generating the password salt in an insecure manner. This may allow an attacker to more easily predict the generated password salt. (OSVDB132465)

Solution

Upgrade to PHP version 7.0.1, or later.