Vulnerabilities > CVE-2016-1904 - Numeric Errors vulnerability in PHP 7.0.0/7.0.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
LOW Availability impact
LOW Summary
Multiple integer overflows in ext/standard/exec.c in PHP 7.x before 7.0.2 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a long string to the (1) php_escape_shell_cmd or (2) php_escape_shell_arg function, leading to a heap-based buffer overflow.
Common Weakness Enumeration (CWE)
Nessus
NASL family | CGI abuses |
NASL id | PHP_7_0_2.NASL |
description | According to its banner, the version of PHP running on the remote host is 7.x prior to 7.0.2. It is, therefore, affected by multiple vulnerabilities : - An out-of-bounds read error exists in the gdImageRotateInterpolated() function in file gd_interpolation.c when handling background colors. A remote attacker can exploit this to disclose memory contents or crash the application. (CVE-2016-1903) - An integer overflow condition exists in file exec.c in the escapeshellarg() and escapeshellcmd() functions due to a failure to properly validate user-supplied string input. A remote attacker can exploit this to cause a heap-based overflow, resulting in a denial of service or the execution of arbitrary code. (CVE-2016-1904) - A use-after-free error exists in file wddx.c in the php_wddx_pop_element() function when handling WDDX packet deserialization. A remote attacker can exploit this, by dereferencing already freed memory, to execute arbitrary code. - A type confusion flaw exists in file xmlrpc-epi-php.c in the PHP_to_XMLRPC_worker() function. A remote attacker can exploit this to disclose memory contents, crash the application process, or have other impact. - A type confusion flaw exists in file wddx.c when handling WDDX packet deserialization. A remote attacker can exploit this to execute arbitrary code. - An unspecified flaw exists in file fpm_log.c in the fpm_log_write() function when handling very long HTTP requests. A local attacker can exploit this to obtain sensitive information, via access to the access log file. (CVE-2016-5114) - A flaw exists in file lsapilib.c when handling requests due to the LSAPI module failing to clear its secrets in child processes. A remote attacker can exploit this to gain access to memory contents, resulting in the disclosure of sensitive information. - A flaw exists in file lsapilib.c in the parseRequest() function due to a failure to properly sanitize input passed through multiple, unspecified parameters. A remote attacker can exploit this to cause a denial of service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 88680 |
published | 2016-02-10 |
reporter | This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/88680 |
title | PHP 7.x < 7.0.2 Multiple Vulnerabilities |
code |
|
References
- http://www.openwall.com/lists/oss-security/2016/01/14/8
- http://www.openwall.com/lists/oss-security/2016/01/14/8
- http://www.php.net/ChangeLog-7.php
- http://www.php.net/ChangeLog-7.php
- http://www.securitytracker.com/id/1034608
- http://www.securitytracker.com/id/1034608
- https://bugs.php.net/bug.php?id=71270
- https://bugs.php.net/bug.php?id=71270
- https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b
- https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b