SB2014060801 - Link following in PHP
Published: June 8, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Link following (CVE-ID: CVE-2014-3981)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.
Remediation
Install update from vendor's website.
References
- http://git.php.net/?p=php-src.git;a=commit;h=91bcadd85e20e50d3f8c2e9721327681640e6f16
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://marc.info/?l=bugtraq&m=141017844705317&w=2
- http://marc.info/?l=bugtraq&m=141390017113542&w=2
- http://openwall.com/lists/oss-security/2014/06/06/12
- http://seclists.org/fulldisclosure/2014/Jun/21
- http://support.apple.com/kb/HT6443
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21683486
- https://bugs.php.net/bug.php?id=67390
- https://bugzilla.redhat.com/show_bug.cgi?id=1104978
- https://support.apple.com/HT204659