USN-2344-1: PHP vulnerabilities

10 September 2014

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

php5 could be made to crash or run programs if it received specially crafted network traffic.

Software Description

  • php5 - HTML-embedded scripting language interpreter

Details

It was discovered that the Fileinfo component in php5 contains an integer overflow. An attacker could use this flaw to cause a denial of service or possibly execute arbitrary code via a crafted CDF file. (CVE-2014-3587)

It was discovered that the php_parserr function contains multiple buffer overflows. An attacker could use this flaw to cause a denial of service or possibly execute arbitrary code via crafted DNS records. (CVE-2014-3597)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.4
php5 - 5.5.9+dfsg-1ubuntu4.4
php5-cgi - 5.5.9+dfsg-1ubuntu4.4
php5-fpm - 5.5.9+dfsg-1ubuntu4.4
Ubuntu 12.04 LTS
libapache2-mod-php5 - 5.3.10-1ubuntu3.14
php5 - 5.3.10-1ubuntu3.14
php5-cgi - 5.3.10-1ubuntu3.14
php5-fpm - 5.3.10-1ubuntu3.14
Ubuntu 10.04 LTS
libapache2-mod-php5 - 5.3.2-1ubuntu4.27
php5 - 5.3.2-1ubuntu4.27
php5-cgi - 5.3.2-1ubuntu4.27

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Apache or php5-fpm to make all the necessary changes.

References