Description: | Summary: The remote host is missing an update for the 'php53' package(s) announced via the SUSE-SU-2015:1018-1 advisory.
Vulnerability Insight: PHP 5.3 was updated to fix multiple security issues: bnc#931776: pcntl_exec() does not check path validity (CVE-2015-4026) bnc#931772: overflow in ftp_genlist() resulting in heap overflow (CVE-2015-4022) bnc#931769: memory corruption in phar_parse_tarfile when entry filename starts with NULL (CVE-2015-4021) bnc#931421: multipart/form-data remote denial-of-service vulnerability (CVE-2015-4024) bnc#928511: buffer over-read in unserialize when parsing Phar (CVE-2015-2783) bnc#928506: buffer over flow when parsing tar/zip/phar in phar_set_inode() (CVE-2015-3329) bnc#925109: SoapClient's __call() type confusion through unserialize() bnc#924972: use-after-free vulnerability in the process_nested_data function (CVE-2015-2787) bnc#923946: embedded gd copy: buffer read overflow in gd_gif_in.c (CVE-2014-9709) bnc#922452: built-in regular expression (regex) library contains a heap overflow vulnerability (CVE-2015-2305) bnc#922451: heap buffer overflow in enchant_broker_request_dict() (CVE-2014-9705) bnc#922022: php's built-in regular expression (regex) library contains a heap overflow vulnerability (CVE-2015-2301) Security Issues: CVE-2015-4026 CVE-2015-4022 CVE-2015-4021 CVE-2015-4024 CVE-2015-2783 CVE-2015-3329 CVE-2015-2787 CVE-2014-9709 CVE-2015-2305 CVE-2014-9705 CVE-2015-2301
Affected Software/OS: 'php53' package(s) on SUSE Linux Enterprise Server 11 SP3, SUSE Linux Enterprise Software Development Kit 11 SP3.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|