SB2016052202 - Multiple vulnerabilities in PHP



SB2016052202 - Multiple vulnerabilities in PHP

Published: May 22, 2016 Updated: June 8, 2025

Security Bulletin ID SB2016052202
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2015-8878)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses.


2) Input validation error (CVE-ID: CVE-2015-8876)

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.


3) Cryptographic issues (CVE-ID: CVE-2015-8867)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.


4) Resource management error (CVE-ID: CVE-2015-8877)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.


Remediation

Install update from vendor's website.