DSA-2974-1 php5 — security update

Date Reported:08 Jul 2014

Affected Packages:php5

Vulnerable:Yes

Security database references:In Mitre’s CVE dictionary: CVE-2014-0207CVE-2014-3478CVE-2014-3479CVE-2014-3480CVE-2014-3487CVE-2014-3515CVE-2014-4721.

More information:
Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2014-0207Francisco Alonso of the Red Hat Security Response Team reported an incorrect boundary check in the cdf_read_short_sector() function.
  • CVE-2014-3478Francisco Alonso of the Red Hat Security Response Team discovered a flaw in the way the truncated pascal string size in the mconvert() function is computed.
  • CVE-2014-3479Francisco Alonso of the Red Hat Security Response Team reported an incorrect boundary check in the cdf_check_stream_offset() function.
  • CVE-2014-3480Francisco Alonso of the Red Hat Security Response Team reported an insufficient boundary check in the cdf_count_chain() function.
  • CVE-2014-3487Francisco Alonso of the Red Hat Security Response Team discovered an incorrect boundary check in the cdf_read_property_info() funtion.
  • CVE-2014-3515Stefan Esser discovered that the ArrayObject and the SPLObjectStorage unserialize() handler do not verify the type of unserialized data before using it. A remote attacker could use this flaw to execute arbitrary code.
  • CVE-2014-4721Stefan Esser discovered a type confusion issue affecting phpinfo(), which might allow an attacker to obtain sensitive information from process memory.

For the stable distribution (wheezy), these problems have been fixed in version 5.4.4-14+deb7u12. In addition, this update contains several bugfixes originally targeted for the upcoming Wheezy point release.

For the testing distribution (jessie), these problems have been fixed in version 5.6.0~rc2+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in version 5.6.0~rc2+dfsg-1.

We recommend that you upgrade your php5 packages.

Comments are disabled