var-201506-0265
Vulnerability from variot
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. PHP is prone to an integer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. The following versions are affected: PHP prior to 5.4.41, 5.5.x prior to 5.5.25, and 5.6.x prior to 5.6.9. 7) - x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: php security update Advisory ID: RHSA-2015:1218-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1218.html Issue date: 2015-07-09 CVE Names: CVE-2014-9425 CVE-2014-9705 CVE-2014-9709 CVE-2015-0232 CVE-2015-0273 CVE-2015-2301 CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 CVE-2015-3329 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 CVE-2015-4602 CVE-2015-4603 =====================================================================
- Summary:
Updated php packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024)
An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-4022)
Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603)
It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598)
Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2301, CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021)
A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705)
A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709)
A double free flaw was found in zend_ts_hash_graceful_destroy() function in the PHP ZTS module. This flaw could possibly cause a PHP application to crash. (CVE-2014-9425)
All php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1177734 - CVE-2014-9425 php: Double-free in zend_ts_hash_graceful_destroy() 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions 1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing 1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode() 1222485 - CVE-2015-4024 php: multipart/form-data request parsing CPU usage DoS 1222538 - CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 php: type confusion issue in unserialize() with various SOAP methods 1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing 1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character 1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name 1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata() 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions 1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions 1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize 1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion
- Package List:
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: php-5.3.3-46.el6_6.src.rpm
i386: php-5.3.3-46.el6_6.i686.rpm php-bcmath-5.3.3-46.el6_6.i686.rpm php-cli-5.3.3-46.el6_6.i686.rpm php-common-5.3.3-46.el6_6.i686.rpm php-dba-5.3.3-46.el6_6.i686.rpm php-debuginfo-5.3.3-46.el6_6.i686.rpm php-devel-5.3.3-46.el6_6.i686.rpm php-embedded-5.3.3-46.el6_6.i686.rpm php-enchant-5.3.3-46.el6_6.i686.rpm php-fpm-5.3.3-46.el6_6.i686.rpm php-gd-5.3.3-46.el6_6.i686.rpm php-imap-5.3.3-46.el6_6.i686.rpm php-intl-5.3.3-46.el6_6.i686.rpm php-ldap-5.3.3-46.el6_6.i686.rpm php-mbstring-5.3.3-46.el6_6.i686.rpm php-mysql-5.3.3-46.el6_6.i686.rpm php-odbc-5.3.3-46.el6_6.i686.rpm php-pdo-5.3.3-46.el6_6.i686.rpm php-pgsql-5.3.3-46.el6_6.i686.rpm php-process-5.3.3-46.el6_6.i686.rpm php-pspell-5.3.3-46.el6_6.i686.rpm php-recode-5.3.3-46.el6_6.i686.rpm php-snmp-5.3.3-46.el6_6.i686.rpm php-soap-5.3.3-46.el6_6.i686.rpm php-tidy-5.3.3-46.el6_6.i686.rpm php-xml-5.3.3-46.el6_6.i686.rpm php-xmlrpc-5.3.3-46.el6_6.i686.rpm php-zts-5.3.3-46.el6_6.i686.rpm
x86_64: php-5.3.3-46.el6_6.x86_64.rpm php-bcmath-5.3.3-46.el6_6.x86_64.rpm php-cli-5.3.3-46.el6_6.x86_64.rpm php-common-5.3.3-46.el6_6.x86_64.rpm php-dba-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-devel-5.3.3-46.el6_6.x86_64.rpm php-embedded-5.3.3-46.el6_6.x86_64.rpm php-enchant-5.3.3-46.el6_6.x86_64.rpm php-fpm-5.3.3-46.el6_6.x86_64.rpm php-gd-5.3.3-46.el6_6.x86_64.rpm php-imap-5.3.3-46.el6_6.x86_64.rpm php-intl-5.3.3-46.el6_6.x86_64.rpm php-ldap-5.3.3-46.el6_6.x86_64.rpm php-mbstring-5.3.3-46.el6_6.x86_64.rpm php-mysql-5.3.3-46.el6_6.x86_64.rpm php-odbc-5.3.3-46.el6_6.x86_64.rpm php-pdo-5.3.3-46.el6_6.x86_64.rpm php-pgsql-5.3.3-46.el6_6.x86_64.rpm php-process-5.3.3-46.el6_6.x86_64.rpm php-pspell-5.3.3-46.el6_6.x86_64.rpm php-recode-5.3.3-46.el6_6.x86_64.rpm php-snmp-5.3.3-46.el6_6.x86_64.rpm php-soap-5.3.3-46.el6_6.x86_64.rpm php-tidy-5.3.3-46.el6_6.x86_64.rpm php-xml-5.3.3-46.el6_6.x86_64.rpm php-xmlrpc-5.3.3-46.el6_6.x86_64.rpm php-zts-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: php-5.3.3-46.el6_6.src.rpm
x86_64: php-cli-5.3.3-46.el6_6.x86_64.rpm php-common-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: php-5.3.3-46.el6_6.x86_64.rpm php-bcmath-5.3.3-46.el6_6.x86_64.rpm php-dba-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-devel-5.3.3-46.el6_6.x86_64.rpm php-embedded-5.3.3-46.el6_6.x86_64.rpm php-enchant-5.3.3-46.el6_6.x86_64.rpm php-fpm-5.3.3-46.el6_6.x86_64.rpm php-gd-5.3.3-46.el6_6.x86_64.rpm php-imap-5.3.3-46.el6_6.x86_64.rpm php-intl-5.3.3-46.el6_6.x86_64.rpm php-ldap-5.3.3-46.el6_6.x86_64.rpm php-mbstring-5.3.3-46.el6_6.x86_64.rpm php-mysql-5.3.3-46.el6_6.x86_64.rpm php-odbc-5.3.3-46.el6_6.x86_64.rpm php-pdo-5.3.3-46.el6_6.x86_64.rpm php-pgsql-5.3.3-46.el6_6.x86_64.rpm php-process-5.3.3-46.el6_6.x86_64.rpm php-pspell-5.3.3-46.el6_6.x86_64.rpm php-recode-5.3.3-46.el6_6.x86_64.rpm php-snmp-5.3.3-46.el6_6.x86_64.rpm php-soap-5.3.3-46.el6_6.x86_64.rpm php-tidy-5.3.3-46.el6_6.x86_64.rpm php-xml-5.3.3-46.el6_6.x86_64.rpm php-xmlrpc-5.3.3-46.el6_6.x86_64.rpm php-zts-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: php-5.3.3-46.el6_6.src.rpm
i386: php-5.3.3-46.el6_6.i686.rpm php-cli-5.3.3-46.el6_6.i686.rpm php-common-5.3.3-46.el6_6.i686.rpm php-debuginfo-5.3.3-46.el6_6.i686.rpm php-gd-5.3.3-46.el6_6.i686.rpm php-ldap-5.3.3-46.el6_6.i686.rpm php-mysql-5.3.3-46.el6_6.i686.rpm php-odbc-5.3.3-46.el6_6.i686.rpm php-pdo-5.3.3-46.el6_6.i686.rpm php-pgsql-5.3.3-46.el6_6.i686.rpm php-soap-5.3.3-46.el6_6.i686.rpm php-xml-5.3.3-46.el6_6.i686.rpm php-xmlrpc-5.3.3-46.el6_6.i686.rpm
ppc64: php-5.3.3-46.el6_6.ppc64.rpm php-cli-5.3.3-46.el6_6.ppc64.rpm php-common-5.3.3-46.el6_6.ppc64.rpm php-debuginfo-5.3.3-46.el6_6.ppc64.rpm php-gd-5.3.3-46.el6_6.ppc64.rpm php-ldap-5.3.3-46.el6_6.ppc64.rpm php-mysql-5.3.3-46.el6_6.ppc64.rpm php-odbc-5.3.3-46.el6_6.ppc64.rpm php-pdo-5.3.3-46.el6_6.ppc64.rpm php-pgsql-5.3.3-46.el6_6.ppc64.rpm php-soap-5.3.3-46.el6_6.ppc64.rpm php-xml-5.3.3-46.el6_6.ppc64.rpm php-xmlrpc-5.3.3-46.el6_6.ppc64.rpm
s390x: php-5.3.3-46.el6_6.s390x.rpm php-cli-5.3.3-46.el6_6.s390x.rpm php-common-5.3.3-46.el6_6.s390x.rpm php-debuginfo-5.3.3-46.el6_6.s390x.rpm php-gd-5.3.3-46.el6_6.s390x.rpm php-ldap-5.3.3-46.el6_6.s390x.rpm php-mysql-5.3.3-46.el6_6.s390x.rpm php-odbc-5.3.3-46.el6_6.s390x.rpm php-pdo-5.3.3-46.el6_6.s390x.rpm php-pgsql-5.3.3-46.el6_6.s390x.rpm php-soap-5.3.3-46.el6_6.s390x.rpm php-xml-5.3.3-46.el6_6.s390x.rpm php-xmlrpc-5.3.3-46.el6_6.s390x.rpm
x86_64: php-5.3.3-46.el6_6.x86_64.rpm php-cli-5.3.3-46.el6_6.x86_64.rpm php-common-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-gd-5.3.3-46.el6_6.x86_64.rpm php-ldap-5.3.3-46.el6_6.x86_64.rpm php-mysql-5.3.3-46.el6_6.x86_64.rpm php-odbc-5.3.3-46.el6_6.x86_64.rpm php-pdo-5.3.3-46.el6_6.x86_64.rpm php-pgsql-5.3.3-46.el6_6.x86_64.rpm php-soap-5.3.3-46.el6_6.x86_64.rpm php-xml-5.3.3-46.el6_6.x86_64.rpm php-xmlrpc-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: php-bcmath-5.3.3-46.el6_6.i686.rpm php-dba-5.3.3-46.el6_6.i686.rpm php-debuginfo-5.3.3-46.el6_6.i686.rpm php-devel-5.3.3-46.el6_6.i686.rpm php-embedded-5.3.3-46.el6_6.i686.rpm php-enchant-5.3.3-46.el6_6.i686.rpm php-fpm-5.3.3-46.el6_6.i686.rpm php-imap-5.3.3-46.el6_6.i686.rpm php-intl-5.3.3-46.el6_6.i686.rpm php-mbstring-5.3.3-46.el6_6.i686.rpm php-process-5.3.3-46.el6_6.i686.rpm php-pspell-5.3.3-46.el6_6.i686.rpm php-recode-5.3.3-46.el6_6.i686.rpm php-snmp-5.3.3-46.el6_6.i686.rpm php-tidy-5.3.3-46.el6_6.i686.rpm php-zts-5.3.3-46.el6_6.i686.rpm
ppc64: php-bcmath-5.3.3-46.el6_6.ppc64.rpm php-dba-5.3.3-46.el6_6.ppc64.rpm php-debuginfo-5.3.3-46.el6_6.ppc64.rpm php-devel-5.3.3-46.el6_6.ppc64.rpm php-embedded-5.3.3-46.el6_6.ppc64.rpm php-enchant-5.3.3-46.el6_6.ppc64.rpm php-fpm-5.3.3-46.el6_6.ppc64.rpm php-imap-5.3.3-46.el6_6.ppc64.rpm php-intl-5.3.3-46.el6_6.ppc64.rpm php-mbstring-5.3.3-46.el6_6.ppc64.rpm php-process-5.3.3-46.el6_6.ppc64.rpm php-pspell-5.3.3-46.el6_6.ppc64.rpm php-recode-5.3.3-46.el6_6.ppc64.rpm php-snmp-5.3.3-46.el6_6.ppc64.rpm php-tidy-5.3.3-46.el6_6.ppc64.rpm php-zts-5.3.3-46.el6_6.ppc64.rpm
s390x: php-bcmath-5.3.3-46.el6_6.s390x.rpm php-dba-5.3.3-46.el6_6.s390x.rpm php-debuginfo-5.3.3-46.el6_6.s390x.rpm php-devel-5.3.3-46.el6_6.s390x.rpm php-embedded-5.3.3-46.el6_6.s390x.rpm php-enchant-5.3.3-46.el6_6.s390x.rpm php-fpm-5.3.3-46.el6_6.s390x.rpm php-imap-5.3.3-46.el6_6.s390x.rpm php-intl-5.3.3-46.el6_6.s390x.rpm php-mbstring-5.3.3-46.el6_6.s390x.rpm php-process-5.3.3-46.el6_6.s390x.rpm php-pspell-5.3.3-46.el6_6.s390x.rpm php-recode-5.3.3-46.el6_6.s390x.rpm php-snmp-5.3.3-46.el6_6.s390x.rpm php-tidy-5.3.3-46.el6_6.s390x.rpm php-zts-5.3.3-46.el6_6.s390x.rpm
x86_64: php-bcmath-5.3.3-46.el6_6.x86_64.rpm php-dba-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-devel-5.3.3-46.el6_6.x86_64.rpm php-embedded-5.3.3-46.el6_6.x86_64.rpm php-enchant-5.3.3-46.el6_6.x86_64.rpm php-fpm-5.3.3-46.el6_6.x86_64.rpm php-imap-5.3.3-46.el6_6.x86_64.rpm php-intl-5.3.3-46.el6_6.x86_64.rpm php-mbstring-5.3.3-46.el6_6.x86_64.rpm php-process-5.3.3-46.el6_6.x86_64.rpm php-pspell-5.3.3-46.el6_6.x86_64.rpm php-recode-5.3.3-46.el6_6.x86_64.rpm php-snmp-5.3.3-46.el6_6.x86_64.rpm php-tidy-5.3.3-46.el6_6.x86_64.rpm php-zts-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: php-5.3.3-46.el6_6.src.rpm
i386: php-5.3.3-46.el6_6.i686.rpm php-cli-5.3.3-46.el6_6.i686.rpm php-common-5.3.3-46.el6_6.i686.rpm php-debuginfo-5.3.3-46.el6_6.i686.rpm php-gd-5.3.3-46.el6_6.i686.rpm php-ldap-5.3.3-46.el6_6.i686.rpm php-mysql-5.3.3-46.el6_6.i686.rpm php-odbc-5.3.3-46.el6_6.i686.rpm php-pdo-5.3.3-46.el6_6.i686.rpm php-pgsql-5.3.3-46.el6_6.i686.rpm php-soap-5.3.3-46.el6_6.i686.rpm php-xml-5.3.3-46.el6_6.i686.rpm php-xmlrpc-5.3.3-46.el6_6.i686.rpm
x86_64: php-5.3.3-46.el6_6.x86_64.rpm php-cli-5.3.3-46.el6_6.x86_64.rpm php-common-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-gd-5.3.3-46.el6_6.x86_64.rpm php-ldap-5.3.3-46.el6_6.x86_64.rpm php-mysql-5.3.3-46.el6_6.x86_64.rpm php-odbc-5.3.3-46.el6_6.x86_64.rpm php-pdo-5.3.3-46.el6_6.x86_64.rpm php-pgsql-5.3.3-46.el6_6.x86_64.rpm php-soap-5.3.3-46.el6_6.x86_64.rpm php-xml-5.3.3-46.el6_6.x86_64.rpm php-xmlrpc-5.3.3-46.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: php-bcmath-5.3.3-46.el6_6.i686.rpm php-dba-5.3.3-46.el6_6.i686.rpm php-debuginfo-5.3.3-46.el6_6.i686.rpm php-devel-5.3.3-46.el6_6.i686.rpm php-embedded-5.3.3-46.el6_6.i686.rpm php-enchant-5.3.3-46.el6_6.i686.rpm php-fpm-5.3.3-46.el6_6.i686.rpm php-imap-5.3.3-46.el6_6.i686.rpm php-intl-5.3.3-46.el6_6.i686.rpm php-mbstring-5.3.3-46.el6_6.i686.rpm php-process-5.3.3-46.el6_6.i686.rpm php-pspell-5.3.3-46.el6_6.i686.rpm php-recode-5.3.3-46.el6_6.i686.rpm php-snmp-5.3.3-46.el6_6.i686.rpm php-tidy-5.3.3-46.el6_6.i686.rpm php-zts-5.3.3-46.el6_6.i686.rpm
x86_64: php-bcmath-5.3.3-46.el6_6.x86_64.rpm php-dba-5.3.3-46.el6_6.x86_64.rpm php-debuginfo-5.3.3-46.el6_6.x86_64.rpm php-devel-5.3.3-46.el6_6.x86_64.rpm php-embedded-5.3.3-46.el6_6.x86_64.rpm php-enchant-5.3.3-46.el6_6.x86_64.rpm php-fpm-5.3.3-46.el6_6.x86_64.rpm php-imap-5.3.3-46.el6_6.x86_64.rpm php-intl-5.3.3-46.el6_6.x86_64.rpm php-mbstring-5.3.3-46.el6_6.x86_64.rpm php-process-5.3.3-46.el6_6.x86_64.rpm php-pspell-5.3.3-46.el6_6.x86_64.rpm php-recode-5.3.3-46.el6_6.x86_64.rpm php-snmp-5.3.3-46.el6_6.x86_64.rpm php-tidy-5.3.3-46.el6_6.x86_64.rpm php-zts-5.3.3-46.el6_6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2014-9425 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2783 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-3307 https://access.redhat.com/security/cve/CVE-2015-3329 https://access.redhat.com/security/cve/CVE-2015-3411 https://access.redhat.com/security/cve/CVE-2015-3412 https://access.redhat.com/security/cve/CVE-2015-4021 https://access.redhat.com/security/cve/CVE-2015-4022 https://access.redhat.com/security/cve/CVE-2015-4024 https://access.redhat.com/security/cve/CVE-2015-4026 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/cve/CVE-2015-4598 https://access.redhat.com/security/cve/CVE-2015-4599 https://access.redhat.com/security/cve/CVE-2015-4600 https://access.redhat.com/security/cve/CVE-2015-4601 https://access.redhat.com/security/cve/CVE-2015-4602 https://access.redhat.com/security/cve/CVE-2015-4603 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVnsPKXlSAg2UNWIIRAtXEAKC6gknTJ+I/czViSyE71AjUZ1pWSQCgo6ip /jsvmaEr/ag17pZ7M9fXiz4= =vWCv -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-2658-1 July 06, 2015
php5 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description: - php5: HTML-embedded scripting language interpreter
Details:
Neal Poole and Tomas Hoger discovered that PHP incorrectly handled NULL bytes in file paths. (CVE-2015-3411, CVE-2015-3412, CVE-2015-4025, CVE-2015-4026, CVE-2015-4598)
Emmanuel Law discovered that the PHP phar extension incorrectly handled filenames starting with a NULL byte. (CVE-2015-4022, CVE-2015-4643)
Shusheng Liu discovered that PHP incorrectly handled certain malformed form data. (CVE-2015-4024)
Andrea Palazzo discovered that the PHP Soap client incorrectly validated data types. (CVE-2015-4147)
Andrea Palazzo discovered that the PHP Soap client incorrectly validated that the uri property is a string. A remote attacker could possibly use these issues to obtain sensitive information or cause a denial of service. This issue only affected Ubuntu 15.04. (CVE-2015-4644)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.2 php5-cgi 5.6.4+dfsg-4ubuntu6.2 php5-cli 5.6.4+dfsg-4ubuntu6.2 php5-fpm 5.6.4+dfsg-4ubuntu6.2
Ubuntu 14.10: libapache2-mod-php5 5.5.12+dfsg-2ubuntu4.6 php5-cgi 5.5.12+dfsg-2ubuntu4.6 php5-cli 5.5.12+dfsg-2ubuntu4.6 php5-fpm 5.5.12+dfsg-2ubuntu4.6
Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.11 php5-cgi 5.5.9+dfsg-1ubuntu4.11 php5-cli 5.5.9+dfsg-1ubuntu4.11 php5-fpm 5.5.9+dfsg-1ubuntu4.11
Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.19 php5-cgi 5.3.10-1ubuntu3.19 php5-cli 5.3.10-1ubuntu3.19 php5-fpm 5.3.10-1ubuntu3.19
In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201606-10
https://security.gentoo.org/
Severity: Normal Title: PHP: Multiple vulnerabilities Date: June 19, 2016 Bugs: #537586, #541098, #544186, #544330, #546872, #549538, #552408, #555576, #555830, #556952, #559612, #562882, #571254, #573892, #577376 ID: 201606-10
Synopsis
Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition.
Background
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All PHP 5.4 users should upgrade to the latest 5.5 stable branch, as PHP 5.4 is now masked in Portage:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33"
All PHP 5.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33"
All PHP 5.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.19"
References
[ 1 ] CVE-2013-6501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501 [ 2 ] CVE-2014-9705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705 [ 3 ] CVE-2014-9709 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709 [ 4 ] CVE-2015-0231 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231 [ 5 ] CVE-2015-0273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273 [ 6 ] CVE-2015-1351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351 [ 7 ] CVE-2015-1352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352 [ 8 ] CVE-2015-2301 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301 [ 9 ] CVE-2015-2348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348 [ 10 ] CVE-2015-2783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783 [ 11 ] CVE-2015-2787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787 [ 12 ] CVE-2015-3329 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329 [ 13 ] CVE-2015-3330 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330 [ 14 ] CVE-2015-4021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021 [ 15 ] CVE-2015-4022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022 [ 16 ] CVE-2015-4025 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025 [ 17 ] CVE-2015-4026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026 [ 18 ] CVE-2015-4147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147 [ 19 ] CVE-2015-4148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148 [ 20 ] CVE-2015-4642 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642 [ 21 ] CVE-2015-4643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643 [ 22 ] CVE-2015-4644 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644 [ 23 ] CVE-2015-6831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831 [ 24 ] CVE-2015-6832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832 [ 25 ] CVE-2015-6833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833 [ 26 ] CVE-2015-6834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834 [ 27 ] CVE-2015-6835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835 [ 28 ] CVE-2015-6836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836 [ 29 ] CVE-2015-6837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837 [ 30 ] CVE-2015-6838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838 [ 31 ] CVE-2015-7803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803 [ 32 ] CVE-2015-7804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201606-10
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/php-5.4.41-i486-1_slack14.1.txz: Upgraded. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.41-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.41-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.41-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.41-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.6.9-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.6.9-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 14.0 package: 5e8d107dba11f8c87693edfdc32f56b7 php-5.4.41-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 24d6895fe6b0e9c88b04ceaccc35383d php-5.4.41-x86_64-1_slack14.0.txz
Slackware 14.1 package: 52011eec3a256a365789562b63e8ba84 php-5.4.41-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 82b75af6253121cab6cc84dd714f554c php-5.4.41-x86_64-1_slack14.1.txz
Slackware -current package: e1c64f133f44b0abac21e0846e39d3c8 n/php-5.6.9-i586-1.txz
Slackware x86_64 -current package: ae51c99af34a4bd8721e7140c38a8c1a n/php-5.6.9-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg php-5.4.41-i486-1_slack14.1.txz
Then, restart Apache httpd:
/etc/rc.d/rc.httpd stop
/etc/rc.d/rc.httpd start
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
CVE-2015-4024
Denial of service when processing multipart/form-data requests.
For the oldstable distribution (wheezy), these problems have been fixed in version 5.4.41-0+deb7u1.
For the stable distribution (jessie), these problems have been fixed in version 5.6.9+dfsg-0+deb8u1.
For the testing distribution (stretch), these problems have been fixed in version 5.6.9+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in version 5.6.9+dfsg-1.
We recommend that you upgrade your php5 packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0265", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "7.0" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.5" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.4" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.21" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.14" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.13" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.12" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.11" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.10" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.6" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.5" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.4" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.3" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.1" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.8" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.7" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.6" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.3" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.6.2" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.9" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.8" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.7" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.24" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.23" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.22" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.20" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.2" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.19" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.5.18" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.4.39" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "php", "scope": "lte", "trust": 1.0, "vendor": "php", "version": "5.4.40" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.6.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.5.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.1" }, { "model": "enterprise linux hpc node eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.10.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10 to 10.10.4" }, { "model": "php", "scope": "lt", "trust": 0.8, "vendor": "the php group", "version": "5.6.x" }, { "model": "php", "scope": "eq", "trust": 0.8, "vendor": "the php group", "version": "5.6.9" }, { "model": "php", "scope": "eq", "trust": 0.8, "vendor": "the php group", "version": "5.5.25" }, { "model": "php", "scope": "lt", "trust": 0.8, "vendor": "the php group", "version": "5.5.x" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "15.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.10" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.6.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.37" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.30" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.29" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.26" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.25" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.17" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.14" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.8" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.7" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.4" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.3" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.2" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.29" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.28" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.24" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.23" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.22" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.21" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.20" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.17" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.16" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.14" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.13" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.12" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.9" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.8" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.7" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.5" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.2" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.25" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.17" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.16" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.15" }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.0" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.5.0" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.9" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.5" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.41" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.40" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.38" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.36" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.35" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.34" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.33" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.32" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.31" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.28" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.27" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.24" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.23" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.22" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.21" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.20" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.19" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.18" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.16" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.16" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.15" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.15" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.14" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.13" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.13" }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.12" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.12" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.12" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.11" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.10" }, { "model": "5.4.0rc2", "scope": null, "trust": 0.3, "vendor": "php", "version": null }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.4" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.4" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.3" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.27" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.26" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.25" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.19" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.18" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.15" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.11" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.10" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "flex system chassis management module 2pet", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0.4" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.1" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.15.2" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.15.1" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.15" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.14" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.13" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.12.1" }, { "model": "alienvault", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.12" }, { "model": "php", "scope": "ne", "trust": 0.3, "vendor": "php", "version": "5.6.9" }, { "model": "flex system chassis management module 2pet14c-2.5.5c", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "alienvault", "scope": "ne", "trust": 0.3, "vendor": "alienvault", "version": "5.2" } ], "sources": [ { "db": "BID", "id": "74902" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "CNNVD", "id": "CNNVD-201506-130" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.4.40", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.4.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.4", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4022" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "maxgeorgspelsberg", "sources": [ { "db": "BID", "id": "74902" } ], "trust": 0.3 }, "cve": "CVE-2015-4022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-4022", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-81983", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4022", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201506-130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-81983", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-4022", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-81983" }, { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "CNNVD", "id": "CNNVD-201506-130" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. PHP is prone to an integer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. The following versions are affected: PHP prior to 5.4.41, 5.5.x prior to 5.5.25, and 5.6.x prior to 5.6.9. 7) - x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: php security update\nAdvisory ID: RHSA-2015:1218-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1218.html\nIssue date: 2015-07-09\nCVE Names: CVE-2014-9425 CVE-2014-9705 CVE-2014-9709 \n CVE-2015-0232 CVE-2015-0273 CVE-2015-2301 \n CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 \n CVE-2015-3329 CVE-2015-3411 CVE-2015-3412 \n CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 \n CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 \n CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 \n CVE-2015-4601 CVE-2015-4602 CVE-2015-4603 \n=====================================================================\n\n1. Summary:\n\nUpdated php packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server. \n\nA flaw was found in the way PHP parsed multipart HTTP POST requests. A\nspecially crafted request could cause PHP to use an excessive amount of CPU\ntime. (CVE-2015-4024)\n\nAn uninitialized pointer use flaw was found in PHP\u0027s Exif extension. A\nspecially crafted JPEG or TIFF file could cause a PHP application using the\nexif_read_data() function to crash or, possibly, execute arbitrary code\nwith the privileges of the user running that PHP application. (CVE-2015-4022)\n\nMultiple flaws were discovered in the way PHP performed object\nunserialization. Specially crafted input processed by the unserialize()\nfunction could cause a PHP application to crash or, possibly, execute\narbitrary code. (CVE-2015-0273, CVE-2015-2787, CVE-2015-4147,\nCVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602,\nCVE-2015-4603)\n\nIt was found that certain PHP functions did not properly handle file names\ncontaining a NULL character. A remote attacker could possibly use this flaw\nto make a PHP script access unexpected files and bypass intended file\nsystem access restrictions. (CVE-2015-4026, CVE-2015-3411, CVE-2015-3412,\nCVE-2015-4598)\n\nMultiple flaws were found in the way the way PHP\u0027s Phar extension parsed\nPhar archives. A specially crafted archive could cause PHP to crash or,\npossibly, execute arbitrary code when opened. (CVE-2015-2301,\nCVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021)\n\nA heap buffer overflow flaw was found in the enchant_broker_request_dict()\nfunction of PHP\u0027s enchant extension. An attacker able to make a PHP\napplication enchant dictionaries could possibly cause it to crash. \n(CVE-2014-9705)\n\nA buffer over-read flaw was found in the GD library used by the PHP gd\nextension. A specially crafted GIF file could cause a PHP application using\nthe imagecreatefromgif() function to crash. (CVE-2014-9709)\n\nA double free flaw was found in zend_ts_hash_graceful_destroy() function in\nthe PHP ZTS module. This flaw could possibly cause a PHP application to\ncrash. (CVE-2014-9425)\n\nAll php users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the httpd daemon must be restarted for the update to\ntake effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1177734 - CVE-2014-9425 php: Double-free in zend_ts_hash_graceful_destroy()\n1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c\n1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c\n1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone\n1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict()\n1194747 - CVE-2015-2301 php: use after free in phar_object.c\n1204868 - CVE-2015-4147 php: SoapClient\u0027s __call() type confusion through unserialize()\n1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re\n1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions\n1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing\n1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode()\n1222485 - CVE-2015-4024 php: multipart/form-data request parsing CPU usage DoS\n1222538 - CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 php: type confusion issue in unserialize() with various SOAP methods\n1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing\n1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character\n1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name\n1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata()\n1226916 - CVE-2015-4148 php: SoapClient\u0027s do_soap_call() type confusion after unserialize()\n1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions\n1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions\n1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize\n1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nphp-5.3.3-46.el6_6.src.rpm\n\ni386:\nphp-5.3.3-46.el6_6.i686.rpm\nphp-bcmath-5.3.3-46.el6_6.i686.rpm\nphp-cli-5.3.3-46.el6_6.i686.rpm\nphp-common-5.3.3-46.el6_6.i686.rpm\nphp-dba-5.3.3-46.el6_6.i686.rpm\nphp-debuginfo-5.3.3-46.el6_6.i686.rpm\nphp-devel-5.3.3-46.el6_6.i686.rpm\nphp-embedded-5.3.3-46.el6_6.i686.rpm\nphp-enchant-5.3.3-46.el6_6.i686.rpm\nphp-fpm-5.3.3-46.el6_6.i686.rpm\nphp-gd-5.3.3-46.el6_6.i686.rpm\nphp-imap-5.3.3-46.el6_6.i686.rpm\nphp-intl-5.3.3-46.el6_6.i686.rpm\nphp-ldap-5.3.3-46.el6_6.i686.rpm\nphp-mbstring-5.3.3-46.el6_6.i686.rpm\nphp-mysql-5.3.3-46.el6_6.i686.rpm\nphp-odbc-5.3.3-46.el6_6.i686.rpm\nphp-pdo-5.3.3-46.el6_6.i686.rpm\nphp-pgsql-5.3.3-46.el6_6.i686.rpm\nphp-process-5.3.3-46.el6_6.i686.rpm\nphp-pspell-5.3.3-46.el6_6.i686.rpm\nphp-recode-5.3.3-46.el6_6.i686.rpm\nphp-snmp-5.3.3-46.el6_6.i686.rpm\nphp-soap-5.3.3-46.el6_6.i686.rpm\nphp-tidy-5.3.3-46.el6_6.i686.rpm\nphp-xml-5.3.3-46.el6_6.i686.rpm\nphp-xmlrpc-5.3.3-46.el6_6.i686.rpm\nphp-zts-5.3.3-46.el6_6.i686.rpm\n\nx86_64:\nphp-5.3.3-46.el6_6.x86_64.rpm\nphp-bcmath-5.3.3-46.el6_6.x86_64.rpm\nphp-cli-5.3.3-46.el6_6.x86_64.rpm\nphp-common-5.3.3-46.el6_6.x86_64.rpm\nphp-dba-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-devel-5.3.3-46.el6_6.x86_64.rpm\nphp-embedded-5.3.3-46.el6_6.x86_64.rpm\nphp-enchant-5.3.3-46.el6_6.x86_64.rpm\nphp-fpm-5.3.3-46.el6_6.x86_64.rpm\nphp-gd-5.3.3-46.el6_6.x86_64.rpm\nphp-imap-5.3.3-46.el6_6.x86_64.rpm\nphp-intl-5.3.3-46.el6_6.x86_64.rpm\nphp-ldap-5.3.3-46.el6_6.x86_64.rpm\nphp-mbstring-5.3.3-46.el6_6.x86_64.rpm\nphp-mysql-5.3.3-46.el6_6.x86_64.rpm\nphp-odbc-5.3.3-46.el6_6.x86_64.rpm\nphp-pdo-5.3.3-46.el6_6.x86_64.rpm\nphp-pgsql-5.3.3-46.el6_6.x86_64.rpm\nphp-process-5.3.3-46.el6_6.x86_64.rpm\nphp-pspell-5.3.3-46.el6_6.x86_64.rpm\nphp-recode-5.3.3-46.el6_6.x86_64.rpm\nphp-snmp-5.3.3-46.el6_6.x86_64.rpm\nphp-soap-5.3.3-46.el6_6.x86_64.rpm\nphp-tidy-5.3.3-46.el6_6.x86_64.rpm\nphp-xml-5.3.3-46.el6_6.x86_64.rpm\nphp-xmlrpc-5.3.3-46.el6_6.x86_64.rpm\nphp-zts-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nphp-5.3.3-46.el6_6.src.rpm\n\nx86_64:\nphp-cli-5.3.3-46.el6_6.x86_64.rpm\nphp-common-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nphp-5.3.3-46.el6_6.x86_64.rpm\nphp-bcmath-5.3.3-46.el6_6.x86_64.rpm\nphp-dba-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-devel-5.3.3-46.el6_6.x86_64.rpm\nphp-embedded-5.3.3-46.el6_6.x86_64.rpm\nphp-enchant-5.3.3-46.el6_6.x86_64.rpm\nphp-fpm-5.3.3-46.el6_6.x86_64.rpm\nphp-gd-5.3.3-46.el6_6.x86_64.rpm\nphp-imap-5.3.3-46.el6_6.x86_64.rpm\nphp-intl-5.3.3-46.el6_6.x86_64.rpm\nphp-ldap-5.3.3-46.el6_6.x86_64.rpm\nphp-mbstring-5.3.3-46.el6_6.x86_64.rpm\nphp-mysql-5.3.3-46.el6_6.x86_64.rpm\nphp-odbc-5.3.3-46.el6_6.x86_64.rpm\nphp-pdo-5.3.3-46.el6_6.x86_64.rpm\nphp-pgsql-5.3.3-46.el6_6.x86_64.rpm\nphp-process-5.3.3-46.el6_6.x86_64.rpm\nphp-pspell-5.3.3-46.el6_6.x86_64.rpm\nphp-recode-5.3.3-46.el6_6.x86_64.rpm\nphp-snmp-5.3.3-46.el6_6.x86_64.rpm\nphp-soap-5.3.3-46.el6_6.x86_64.rpm\nphp-tidy-5.3.3-46.el6_6.x86_64.rpm\nphp-xml-5.3.3-46.el6_6.x86_64.rpm\nphp-xmlrpc-5.3.3-46.el6_6.x86_64.rpm\nphp-zts-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nphp-5.3.3-46.el6_6.src.rpm\n\ni386:\nphp-5.3.3-46.el6_6.i686.rpm\nphp-cli-5.3.3-46.el6_6.i686.rpm\nphp-common-5.3.3-46.el6_6.i686.rpm\nphp-debuginfo-5.3.3-46.el6_6.i686.rpm\nphp-gd-5.3.3-46.el6_6.i686.rpm\nphp-ldap-5.3.3-46.el6_6.i686.rpm\nphp-mysql-5.3.3-46.el6_6.i686.rpm\nphp-odbc-5.3.3-46.el6_6.i686.rpm\nphp-pdo-5.3.3-46.el6_6.i686.rpm\nphp-pgsql-5.3.3-46.el6_6.i686.rpm\nphp-soap-5.3.3-46.el6_6.i686.rpm\nphp-xml-5.3.3-46.el6_6.i686.rpm\nphp-xmlrpc-5.3.3-46.el6_6.i686.rpm\n\nppc64:\nphp-5.3.3-46.el6_6.ppc64.rpm\nphp-cli-5.3.3-46.el6_6.ppc64.rpm\nphp-common-5.3.3-46.el6_6.ppc64.rpm\nphp-debuginfo-5.3.3-46.el6_6.ppc64.rpm\nphp-gd-5.3.3-46.el6_6.ppc64.rpm\nphp-ldap-5.3.3-46.el6_6.ppc64.rpm\nphp-mysql-5.3.3-46.el6_6.ppc64.rpm\nphp-odbc-5.3.3-46.el6_6.ppc64.rpm\nphp-pdo-5.3.3-46.el6_6.ppc64.rpm\nphp-pgsql-5.3.3-46.el6_6.ppc64.rpm\nphp-soap-5.3.3-46.el6_6.ppc64.rpm\nphp-xml-5.3.3-46.el6_6.ppc64.rpm\nphp-xmlrpc-5.3.3-46.el6_6.ppc64.rpm\n\ns390x:\nphp-5.3.3-46.el6_6.s390x.rpm\nphp-cli-5.3.3-46.el6_6.s390x.rpm\nphp-common-5.3.3-46.el6_6.s390x.rpm\nphp-debuginfo-5.3.3-46.el6_6.s390x.rpm\nphp-gd-5.3.3-46.el6_6.s390x.rpm\nphp-ldap-5.3.3-46.el6_6.s390x.rpm\nphp-mysql-5.3.3-46.el6_6.s390x.rpm\nphp-odbc-5.3.3-46.el6_6.s390x.rpm\nphp-pdo-5.3.3-46.el6_6.s390x.rpm\nphp-pgsql-5.3.3-46.el6_6.s390x.rpm\nphp-soap-5.3.3-46.el6_6.s390x.rpm\nphp-xml-5.3.3-46.el6_6.s390x.rpm\nphp-xmlrpc-5.3.3-46.el6_6.s390x.rpm\n\nx86_64:\nphp-5.3.3-46.el6_6.x86_64.rpm\nphp-cli-5.3.3-46.el6_6.x86_64.rpm\nphp-common-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-gd-5.3.3-46.el6_6.x86_64.rpm\nphp-ldap-5.3.3-46.el6_6.x86_64.rpm\nphp-mysql-5.3.3-46.el6_6.x86_64.rpm\nphp-odbc-5.3.3-46.el6_6.x86_64.rpm\nphp-pdo-5.3.3-46.el6_6.x86_64.rpm\nphp-pgsql-5.3.3-46.el6_6.x86_64.rpm\nphp-soap-5.3.3-46.el6_6.x86_64.rpm\nphp-xml-5.3.3-46.el6_6.x86_64.rpm\nphp-xmlrpc-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nphp-bcmath-5.3.3-46.el6_6.i686.rpm\nphp-dba-5.3.3-46.el6_6.i686.rpm\nphp-debuginfo-5.3.3-46.el6_6.i686.rpm\nphp-devel-5.3.3-46.el6_6.i686.rpm\nphp-embedded-5.3.3-46.el6_6.i686.rpm\nphp-enchant-5.3.3-46.el6_6.i686.rpm\nphp-fpm-5.3.3-46.el6_6.i686.rpm\nphp-imap-5.3.3-46.el6_6.i686.rpm\nphp-intl-5.3.3-46.el6_6.i686.rpm\nphp-mbstring-5.3.3-46.el6_6.i686.rpm\nphp-process-5.3.3-46.el6_6.i686.rpm\nphp-pspell-5.3.3-46.el6_6.i686.rpm\nphp-recode-5.3.3-46.el6_6.i686.rpm\nphp-snmp-5.3.3-46.el6_6.i686.rpm\nphp-tidy-5.3.3-46.el6_6.i686.rpm\nphp-zts-5.3.3-46.el6_6.i686.rpm\n\nppc64:\nphp-bcmath-5.3.3-46.el6_6.ppc64.rpm\nphp-dba-5.3.3-46.el6_6.ppc64.rpm\nphp-debuginfo-5.3.3-46.el6_6.ppc64.rpm\nphp-devel-5.3.3-46.el6_6.ppc64.rpm\nphp-embedded-5.3.3-46.el6_6.ppc64.rpm\nphp-enchant-5.3.3-46.el6_6.ppc64.rpm\nphp-fpm-5.3.3-46.el6_6.ppc64.rpm\nphp-imap-5.3.3-46.el6_6.ppc64.rpm\nphp-intl-5.3.3-46.el6_6.ppc64.rpm\nphp-mbstring-5.3.3-46.el6_6.ppc64.rpm\nphp-process-5.3.3-46.el6_6.ppc64.rpm\nphp-pspell-5.3.3-46.el6_6.ppc64.rpm\nphp-recode-5.3.3-46.el6_6.ppc64.rpm\nphp-snmp-5.3.3-46.el6_6.ppc64.rpm\nphp-tidy-5.3.3-46.el6_6.ppc64.rpm\nphp-zts-5.3.3-46.el6_6.ppc64.rpm\n\ns390x:\nphp-bcmath-5.3.3-46.el6_6.s390x.rpm\nphp-dba-5.3.3-46.el6_6.s390x.rpm\nphp-debuginfo-5.3.3-46.el6_6.s390x.rpm\nphp-devel-5.3.3-46.el6_6.s390x.rpm\nphp-embedded-5.3.3-46.el6_6.s390x.rpm\nphp-enchant-5.3.3-46.el6_6.s390x.rpm\nphp-fpm-5.3.3-46.el6_6.s390x.rpm\nphp-imap-5.3.3-46.el6_6.s390x.rpm\nphp-intl-5.3.3-46.el6_6.s390x.rpm\nphp-mbstring-5.3.3-46.el6_6.s390x.rpm\nphp-process-5.3.3-46.el6_6.s390x.rpm\nphp-pspell-5.3.3-46.el6_6.s390x.rpm\nphp-recode-5.3.3-46.el6_6.s390x.rpm\nphp-snmp-5.3.3-46.el6_6.s390x.rpm\nphp-tidy-5.3.3-46.el6_6.s390x.rpm\nphp-zts-5.3.3-46.el6_6.s390x.rpm\n\nx86_64:\nphp-bcmath-5.3.3-46.el6_6.x86_64.rpm\nphp-dba-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-devel-5.3.3-46.el6_6.x86_64.rpm\nphp-embedded-5.3.3-46.el6_6.x86_64.rpm\nphp-enchant-5.3.3-46.el6_6.x86_64.rpm\nphp-fpm-5.3.3-46.el6_6.x86_64.rpm\nphp-imap-5.3.3-46.el6_6.x86_64.rpm\nphp-intl-5.3.3-46.el6_6.x86_64.rpm\nphp-mbstring-5.3.3-46.el6_6.x86_64.rpm\nphp-process-5.3.3-46.el6_6.x86_64.rpm\nphp-pspell-5.3.3-46.el6_6.x86_64.rpm\nphp-recode-5.3.3-46.el6_6.x86_64.rpm\nphp-snmp-5.3.3-46.el6_6.x86_64.rpm\nphp-tidy-5.3.3-46.el6_6.x86_64.rpm\nphp-zts-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nphp-5.3.3-46.el6_6.src.rpm\n\ni386:\nphp-5.3.3-46.el6_6.i686.rpm\nphp-cli-5.3.3-46.el6_6.i686.rpm\nphp-common-5.3.3-46.el6_6.i686.rpm\nphp-debuginfo-5.3.3-46.el6_6.i686.rpm\nphp-gd-5.3.3-46.el6_6.i686.rpm\nphp-ldap-5.3.3-46.el6_6.i686.rpm\nphp-mysql-5.3.3-46.el6_6.i686.rpm\nphp-odbc-5.3.3-46.el6_6.i686.rpm\nphp-pdo-5.3.3-46.el6_6.i686.rpm\nphp-pgsql-5.3.3-46.el6_6.i686.rpm\nphp-soap-5.3.3-46.el6_6.i686.rpm\nphp-xml-5.3.3-46.el6_6.i686.rpm\nphp-xmlrpc-5.3.3-46.el6_6.i686.rpm\n\nx86_64:\nphp-5.3.3-46.el6_6.x86_64.rpm\nphp-cli-5.3.3-46.el6_6.x86_64.rpm\nphp-common-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-gd-5.3.3-46.el6_6.x86_64.rpm\nphp-ldap-5.3.3-46.el6_6.x86_64.rpm\nphp-mysql-5.3.3-46.el6_6.x86_64.rpm\nphp-odbc-5.3.3-46.el6_6.x86_64.rpm\nphp-pdo-5.3.3-46.el6_6.x86_64.rpm\nphp-pgsql-5.3.3-46.el6_6.x86_64.rpm\nphp-soap-5.3.3-46.el6_6.x86_64.rpm\nphp-xml-5.3.3-46.el6_6.x86_64.rpm\nphp-xmlrpc-5.3.3-46.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nphp-bcmath-5.3.3-46.el6_6.i686.rpm\nphp-dba-5.3.3-46.el6_6.i686.rpm\nphp-debuginfo-5.3.3-46.el6_6.i686.rpm\nphp-devel-5.3.3-46.el6_6.i686.rpm\nphp-embedded-5.3.3-46.el6_6.i686.rpm\nphp-enchant-5.3.3-46.el6_6.i686.rpm\nphp-fpm-5.3.3-46.el6_6.i686.rpm\nphp-imap-5.3.3-46.el6_6.i686.rpm\nphp-intl-5.3.3-46.el6_6.i686.rpm\nphp-mbstring-5.3.3-46.el6_6.i686.rpm\nphp-process-5.3.3-46.el6_6.i686.rpm\nphp-pspell-5.3.3-46.el6_6.i686.rpm\nphp-recode-5.3.3-46.el6_6.i686.rpm\nphp-snmp-5.3.3-46.el6_6.i686.rpm\nphp-tidy-5.3.3-46.el6_6.i686.rpm\nphp-zts-5.3.3-46.el6_6.i686.rpm\n\nx86_64:\nphp-bcmath-5.3.3-46.el6_6.x86_64.rpm\nphp-dba-5.3.3-46.el6_6.x86_64.rpm\nphp-debuginfo-5.3.3-46.el6_6.x86_64.rpm\nphp-devel-5.3.3-46.el6_6.x86_64.rpm\nphp-embedded-5.3.3-46.el6_6.x86_64.rpm\nphp-enchant-5.3.3-46.el6_6.x86_64.rpm\nphp-fpm-5.3.3-46.el6_6.x86_64.rpm\nphp-imap-5.3.3-46.el6_6.x86_64.rpm\nphp-intl-5.3.3-46.el6_6.x86_64.rpm\nphp-mbstring-5.3.3-46.el6_6.x86_64.rpm\nphp-process-5.3.3-46.el6_6.x86_64.rpm\nphp-pspell-5.3.3-46.el6_6.x86_64.rpm\nphp-recode-5.3.3-46.el6_6.x86_64.rpm\nphp-snmp-5.3.3-46.el6_6.x86_64.rpm\nphp-tidy-5.3.3-46.el6_6.x86_64.rpm\nphp-zts-5.3.3-46.el6_6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-9425\nhttps://access.redhat.com/security/cve/CVE-2014-9705\nhttps://access.redhat.com/security/cve/CVE-2014-9709\nhttps://access.redhat.com/security/cve/CVE-2015-0232\nhttps://access.redhat.com/security/cve/CVE-2015-0273\nhttps://access.redhat.com/security/cve/CVE-2015-2301\nhttps://access.redhat.com/security/cve/CVE-2015-2783\nhttps://access.redhat.com/security/cve/CVE-2015-2787\nhttps://access.redhat.com/security/cve/CVE-2015-3307\nhttps://access.redhat.com/security/cve/CVE-2015-3329\nhttps://access.redhat.com/security/cve/CVE-2015-3411\nhttps://access.redhat.com/security/cve/CVE-2015-3412\nhttps://access.redhat.com/security/cve/CVE-2015-4021\nhttps://access.redhat.com/security/cve/CVE-2015-4022\nhttps://access.redhat.com/security/cve/CVE-2015-4024\nhttps://access.redhat.com/security/cve/CVE-2015-4026\nhttps://access.redhat.com/security/cve/CVE-2015-4147\nhttps://access.redhat.com/security/cve/CVE-2015-4148\nhttps://access.redhat.com/security/cve/CVE-2015-4598\nhttps://access.redhat.com/security/cve/CVE-2015-4599\nhttps://access.redhat.com/security/cve/CVE-2015-4600\nhttps://access.redhat.com/security/cve/CVE-2015-4601\nhttps://access.redhat.com/security/cve/CVE-2015-4602\nhttps://access.redhat.com/security/cve/CVE-2015-4603\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVnsPKXlSAg2UNWIIRAtXEAKC6gknTJ+I/czViSyE71AjUZ1pWSQCgo6ip\n/jsvmaEr/ag17pZ7M9fXiz4=\n=vWCv\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ============================================================================\nUbuntu Security Notice USN-2658-1\nJuly 06, 2015\n\nphp5 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in PHP. \n\nSoftware Description:\n- php5: HTML-embedded scripting language interpreter\n\nDetails:\n\nNeal Poole and Tomas Hoger discovered that PHP incorrectly handled NULL\nbytes in file paths. (CVE-2015-3411, CVE-2015-3412, CVE-2015-4025, CVE-2015-4026,\nCVE-2015-4598)\n\nEmmanuel Law discovered that the PHP phar extension incorrectly handled\nfilenames starting with a NULL byte. (CVE-2015-4022,\nCVE-2015-4643)\n\nShusheng Liu discovered that PHP incorrectly handled certain malformed form\ndata. (CVE-2015-4024)\n\nAndrea Palazzo discovered that the PHP Soap client incorrectly validated\ndata types. (CVE-2015-4147)\n\nAndrea Palazzo discovered that the PHP Soap client incorrectly validated\nthat the uri property is a string. A remote attacker could possibly use these issues to\nobtain sensitive information or cause a denial of service. This issue only affected Ubuntu\n15.04. (CVE-2015-4644)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.2\n php5-cgi 5.6.4+dfsg-4ubuntu6.2\n php5-cli 5.6.4+dfsg-4ubuntu6.2\n php5-fpm 5.6.4+dfsg-4ubuntu6.2\n\nUbuntu 14.10:\n libapache2-mod-php5 5.5.12+dfsg-2ubuntu4.6\n php5-cgi 5.5.12+dfsg-2ubuntu4.6\n php5-cli 5.5.12+dfsg-2ubuntu4.6\n php5-fpm 5.5.12+dfsg-2ubuntu4.6\n\nUbuntu 14.04 LTS:\n libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.11\n php5-cgi 5.5.9+dfsg-1ubuntu4.11\n php5-cli 5.5.9+dfsg-1ubuntu4.11\n php5-fpm 5.5.9+dfsg-1ubuntu4.11\n\nUbuntu 12.04 LTS:\n libapache2-mod-php5 5.3.10-1ubuntu3.19\n php5-cgi 5.3.10-1ubuntu3.19\n php5-cli 5.3.10-1ubuntu3.19\n php5-fpm 5.3.10-1ubuntu3.19\n\nIn general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201606-10\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: PHP: Multiple vulnerabilities\n Date: June 19, 2016\n Bugs: #537586, #541098, #544186, #544330, #546872, #549538,\n #552408, #555576, #555830, #556952, #559612, #562882,\n #571254, #573892, #577376\n ID: 201606-10\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in PHP, the worst of which\ncould lead to arbitrary code execution, or cause a Denial of Service\ncondition. \n\nBackground\n==========\n\nPHP is a widely-used general-purpose scripting language that is\nespecially suited for Web development and can be embedded into HTML. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll PHP 5.4 users should upgrade to the latest 5.5 stable branch, as\nPHP 5.4 is now masked in Portage:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev=lang/php-5.5.33\"\n\nAll PHP 5.5 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev=lang/php-5.5.33\"\n\nAll PHP 5.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev=lang/php-5.6.19\"\n\nReferences\n==========\n\n[ 1 ] CVE-2013-6501\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501\n[ 2 ] CVE-2014-9705\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705\n[ 3 ] CVE-2014-9709\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709\n[ 4 ] CVE-2015-0231\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231\n[ 5 ] CVE-2015-0273\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273\n[ 6 ] CVE-2015-1351\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351\n[ 7 ] CVE-2015-1352\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352\n[ 8 ] CVE-2015-2301\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301\n[ 9 ] CVE-2015-2348\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348\n[ 10 ] CVE-2015-2783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783\n[ 11 ] CVE-2015-2787\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787\n[ 12 ] CVE-2015-3329\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329\n[ 13 ] CVE-2015-3330\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330\n[ 14 ] CVE-2015-4021\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021\n[ 15 ] CVE-2015-4022\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022\n[ 16 ] CVE-2015-4025\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025\n[ 17 ] CVE-2015-4026\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026\n[ 18 ] CVE-2015-4147\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147\n[ 19 ] CVE-2015-4148\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148\n[ 20 ] CVE-2015-4642\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642\n[ 21 ] CVE-2015-4643\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643\n[ 22 ] CVE-2015-4644\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644\n[ 23 ] CVE-2015-6831\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831\n[ 24 ] CVE-2015-6832\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832\n[ 25 ] CVE-2015-6833\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833\n[ 26 ] CVE-2015-6834\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834\n[ 27 ] CVE-2015-6835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835\n[ 28 ] CVE-2015-6836\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836\n[ 29 ] CVE-2015-6837\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837\n[ 30 ] CVE-2015-6838\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838\n[ 31 ] CVE-2015-7803\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803\n[ 32 ] CVE-2015-7804\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201606-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/php-5.4.41-i486-1_slack14.1.txz: Upgraded. \n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.41-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.41-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.41-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.41-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.6.9-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.6.9-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\n5e8d107dba11f8c87693edfdc32f56b7 php-5.4.41-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n24d6895fe6b0e9c88b04ceaccc35383d php-5.4.41-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n52011eec3a256a365789562b63e8ba84 php-5.4.41-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n82b75af6253121cab6cc84dd714f554c php-5.4.41-x86_64-1_slack14.1.txz\n\nSlackware -current package:\ne1c64f133f44b0abac21e0846e39d3c8 n/php-5.6.9-i586-1.txz\n\nSlackware x86_64 -current package:\nae51c99af34a4bd8721e7140c38a8c1a n/php-5.6.9-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg php-5.4.41-i486-1_slack14.1.txz\n\nThen, restart Apache httpd:\n# /etc/rc.d/rc.httpd stop\n# /etc/rc.d/rc.httpd start\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nCVE-2015-4024\n\n Denial of service when processing multipart/form-data requests. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 5.4.41-0+deb7u1. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 5.6.9+dfsg-0+deb8u1. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 5.6.9+dfsg-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 5.6.9+dfsg-1. \n\nWe recommend that you upgrade your php5 packages", "sources": [ { "db": "NVD", "id": "CVE-2015-4022" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "BID", "id": "74902" }, { "db": "VULHUB", "id": "VHN-81983" }, { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "PACKETSTORM", "id": "132440" }, { "db": "PACKETSTORM", "id": "132618" }, { "db": "PACKETSTORM", "id": "132531" }, { "db": "PACKETSTORM", "id": "132442" }, { "db": "PACKETSTORM", "id": "137539" }, { "db": "PACKETSTORM", "id": "132284" }, { "db": "PACKETSTORM", "id": "132198" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4022", "trust": 3.6 }, { "db": "BID", "id": "74902", "trust": 2.1 }, { "db": "SECTRACK", "id": "1032433", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2015-003049", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201506-130", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-81983", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-4022", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132440", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132618", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132531", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132442", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137539", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132284", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132198", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81983" }, { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "BID", "id": "74902" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "PACKETSTORM", "id": "132440" }, { "db": "PACKETSTORM", "id": "132618" }, { "db": "PACKETSTORM", "id": "132531" }, { "db": "PACKETSTORM", "id": "132442" }, { "db": "PACKETSTORM", "id": "137539" }, { "db": "PACKETSTORM", "id": "132284" }, { "db": "PACKETSTORM", "id": "132198" }, { "db": "CNNVD", "id": "CNNVD-201506-130" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "id": "VAR-201506-0265", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-81983" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:46:59.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205031" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht205031" }, { "title": "Sec Bug #69545", "trust": 0.8, "url": "https://bugs.php.net/bug.php?id=69545" }, { "title": "PHP 5 ChangeLog", "trust": 0.8, "url": "http://php.net/changelog-5.php" }, { "title": "TLSA-2015-15", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2015/tlsa-2015-15j.html" }, { "title": "php-src-php-5.5.25", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=56181" }, { "title": "php-src-php-5.5.25", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=56180" }, { "title": "php-src-php-5.6.9", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=56183" }, { "title": "php-src-php-5.6.9", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=56182" }, { "title": "php-src-php-5.4.41", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=56179" }, { "title": "Debian Security Advisories: DSA-3280-1 php5 -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=46f85ac4e3abfa7a18e115fb47892db6" }, { "title": "Amazon Linux AMI: ALAS-2015-535", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-535" }, { "title": "Amazon Linux AMI: ALAS-2015-534", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-534" }, { "title": "Amazon Linux AMI: ALAS-2015-536", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-536" }, { "title": "Ubuntu Security Notice: php5 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2658-1" }, { "title": "Apple: OS X Yosemite v10.10.5 and Security Update 2015-006", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=9834d0d73bf28fb80d3390930bafd906" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a22ad41e97bbfc5abb0bb927bf43089c" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=8ad80411af3e936eb2998df70506cc71" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "CNNVD", "id": "CNNVD-201506-130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81983" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "trust": 2.1, "url": "https://bugs.php.net/bug.php?id=69545" }, { "trust": 2.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1135.html" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201606-10" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2015-1186.html" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2015-1187.html" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2015-1218.html" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/74902" }, { "trust": 1.8, "url": "http://php.net/changelog-5.php" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht205031" }, { "trust": 1.8, "url": "http://www.debian.org/security/2015/dsa-3280" }, { "trust": 1.8, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/158616.html" }, { "trust": 1.8, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/159031.html" }, { "trust": 1.8, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/158915.html" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2015-1219.html" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1032433" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4022" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4022" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4021" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4026" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4022" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4024" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4025" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3329" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2783" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3411" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3412" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4598" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4602" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4603" }, { "trust": 0.3, "url": "http://www.php.net/" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "trust": 0.3, "url": "https://www.oracle.com/technetwork/topics/security/bulletinjul2017-3814622.html" }, { "trust": 0.3, "url": "https://www.alienvault.com/forums/discussion/6075/security-advisory-alienvault-v5-2-addresses-55-vulnerabilities" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099196" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098669" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4605" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4603" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4024" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3330" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4021" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-3307" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-3411" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4022" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-2783" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4602" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3307" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4026" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-3412" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4604" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-3329" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2015-4598" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4148" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4147" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-4604" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-3330" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-4605" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-4025" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4601" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4600" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9705" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4599" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2301" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2787" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9709" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0273" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4644" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4643" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/189.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39137" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39498" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2658-1/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4600" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4147" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4148" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0232" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-0232" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-0273" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9705" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9425" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4599" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2787" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9425" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4601" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2301" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9709" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu6.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.5.12+dfsg-2ubuntu4.6" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2658-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.19" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2301" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1352" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2348" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4022" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6836" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9709" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4026" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6836" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6831" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0273" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4021" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7804" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0231" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4643" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6501" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2348" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6835" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4642" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1351" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1352" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6832" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6832" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6831" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6835" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3330" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6838" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4642" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2787" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4148" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6501" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4147" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3329" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7803" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6837" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1351" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6833" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4025" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4644" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9705" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6834" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0231" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6833" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2325" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4025" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4026" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4021" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4024" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2326" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2325" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-7243" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-7243" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2326" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" } ], "sources": [ { "db": "VULHUB", "id": "VHN-81983" }, { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "BID", "id": "74902" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "PACKETSTORM", "id": "132440" }, { "db": "PACKETSTORM", "id": "132618" }, { "db": "PACKETSTORM", "id": "132531" }, { "db": "PACKETSTORM", "id": "132442" }, { "db": "PACKETSTORM", "id": "137539" }, { "db": "PACKETSTORM", "id": "132284" }, { "db": "PACKETSTORM", "id": "132198" }, { "db": "CNNVD", "id": "CNNVD-201506-130" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-81983" }, { "db": "VULMON", "id": "CVE-2015-4022" }, { "db": "BID", "id": "74902" }, { "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "db": "PACKETSTORM", "id": "132440" }, { "db": "PACKETSTORM", "id": "132618" }, { "db": "PACKETSTORM", "id": "132531" }, { "db": "PACKETSTORM", "id": "132442" }, { "db": "PACKETSTORM", "id": "137539" }, { "db": "PACKETSTORM", "id": "132284" }, { "db": "PACKETSTORM", "id": "132198" }, { "db": "CNNVD", "id": "CNNVD-201506-130" }, { "db": "NVD", "id": "CVE-2015-4022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-09T00:00:00", "db": "VULHUB", "id": "VHN-81983" }, { "date": "2015-06-09T00:00:00", "db": "VULMON", "id": "CVE-2015-4022" }, { "date": "2015-05-14T00:00:00", "db": "BID", "id": "74902" }, { "date": "2015-06-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "date": "2015-06-25T14:18:12", "db": "PACKETSTORM", "id": "132440" }, { "date": "2015-07-09T23:16:17", "db": "PACKETSTORM", "id": "132618" }, { "date": "2015-07-07T00:23:34", "db": "PACKETSTORM", "id": "132531" }, { "date": "2015-06-25T14:18:25", "db": "PACKETSTORM", "id": "132442" }, { "date": "2016-06-19T15:55:00", "db": "PACKETSTORM", "id": "137539" }, { "date": "2015-06-12T13:17:49", "db": "PACKETSTORM", "id": "132284" }, { "date": "2015-06-10T01:21:58", "db": "PACKETSTORM", "id": "132198" }, { "date": "2015-06-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-130" }, { "date": "2015-06-09T18:59:05.833000", "db": "NVD", "id": "CVE-2015-4022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-22T00:00:00", "db": "VULHUB", "id": "VHN-81983" }, { "date": "2019-04-22T00:00:00", "db": "VULMON", "id": "CVE-2015-4022" }, { "date": "2017-07-21T13:07:00", "db": "BID", "id": "74902" }, { "date": "2015-08-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003049" }, { "date": "2019-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-130" }, { "date": "2019-04-22T17:48:00.643000", "db": "NVD", "id": "CVE-2015-4022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "132440" }, { "db": "PACKETSTORM", "id": "132531" }, { "db": "PACKETSTORM", "id": "132442" }, { "db": "CNNVD", "id": "CNNVD-201506-130" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP of ext/ftp/ftp.c of ftp_genlist Integer overflow vulnerability in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003049" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-130" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.