SB2018101913 - Multiple vulnerabilities in PHP
Published: October 19, 2018 Updated: June 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2006-0097)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the create_named_pipe function in libmysql.c when processing a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Input validation error (CVE-ID: CVE-2005-1042)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
3) Input validation error (CVE-ID: CVE-2005-1043)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Remediation
Install update from vendor's website.
References
- http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0274.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041013.html
- http://secunia.com/advisories/18275
- http://www.osvdb.org/22232
- http://www.php.net/ChangeLog-4.php#4.4.3
- http://www.securityfocus.com/archive/1/420986/100/0/threaded
- http://www.securityfocus.com/bid/16145
- http://www.vupen.com/english/advisories/2006/0046
- http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.33&r2=1.118.2.34&ty=u
- http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html
- http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:072
- http://www.redhat.com/support/errata/RHSA-2005-405.html
- http://www.redhat.com/support/errata/RHSA-2005-406.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10822
- https://usn.ubuntu.com/112-1/
- http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.29&r2=1.118.2.30&ty=u
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10307