Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-7061 CVE-2020-7062 CVE-2020-7063 |
CWE-ID | CWE-122 CWE-476 CWE-276 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU25593
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7061
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the phar_extract_file() function. A remote attacker can pass specially crafted file to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
php73-devel-7.3.15-1.24.amzn1.i686
php73-gmp-7.3.15-1.24.amzn1.i686
php73-intl-7.3.15-1.24.amzn1.i686
php73-soap-7.3.15-1.24.amzn1.i686
php73-pdo-7.3.15-1.24.amzn1.i686
php73-enchant-7.3.15-1.24.amzn1.i686
php73-xml-7.3.15-1.24.amzn1.i686
php73-dba-7.3.15-1.24.amzn1.i686
php73-imap-7.3.15-1.24.amzn1.i686
php73-bcmath-7.3.15-1.24.amzn1.i686
php73-recode-7.3.15-1.24.amzn1.i686
php73-ldap-7.3.15-1.24.amzn1.i686
php73-odbc-7.3.15-1.24.amzn1.i686
php73-mysqlnd-7.3.15-1.24.amzn1.i686
php73-gd-7.3.15-1.24.amzn1.i686
php73-xmlrpc-7.3.15-1.24.amzn1.i686
php73-opcache-7.3.15-1.24.amzn1.i686
php73-fpm-7.3.15-1.24.amzn1.i686
php73-process-7.3.15-1.24.amzn1.i686
php73-cli-7.3.15-1.24.amzn1.i686
php73-pgsql-7.3.15-1.24.amzn1.i686
php73-embedded-7.3.15-1.24.amzn1.i686
php73-mbstring-7.3.15-1.24.amzn1.i686
php73-snmp-7.3.15-1.24.amzn1.i686
php73-debuginfo-7.3.15-1.24.amzn1.i686
php73-pspell-7.3.15-1.24.amzn1.i686
php73-common-7.3.15-1.24.amzn1.i686
php73-pdo-dblib-7.3.15-1.24.amzn1.i686
php73-json-7.3.15-1.24.amzn1.i686
php73-7.3.15-1.24.amzn1.i686
php73-tidy-7.3.15-1.24.amzn1.i686
php73-dbg-7.3.15-1.24.amzn1.i686
src:
php73-7.3.15-1.24.amzn1.src
x86_64:
php73-mbstring-7.3.15-1.24.amzn1.x86_64
php73-odbc-7.3.15-1.24.amzn1.x86_64
php73-pdo-7.3.15-1.24.amzn1.x86_64
php73-debuginfo-7.3.15-1.24.amzn1.x86_64
php73-mysqlnd-7.3.15-1.24.amzn1.x86_64
php73-7.3.15-1.24.amzn1.x86_64
php73-soap-7.3.15-1.24.amzn1.x86_64
php73-imap-7.3.15-1.24.amzn1.x86_64
php73-process-7.3.15-1.24.amzn1.x86_64
php73-gd-7.3.15-1.24.amzn1.x86_64
php73-cli-7.3.15-1.24.amzn1.x86_64
php73-common-7.3.15-1.24.amzn1.x86_64
php73-devel-7.3.15-1.24.amzn1.x86_64
php73-enchant-7.3.15-1.24.amzn1.x86_64
php73-pdo-dblib-7.3.15-1.24.amzn1.x86_64
php73-dba-7.3.15-1.24.amzn1.x86_64
php73-xml-7.3.15-1.24.amzn1.x86_64
php73-xmlrpc-7.3.15-1.24.amzn1.x86_64
php73-dbg-7.3.15-1.24.amzn1.x86_64
php73-fpm-7.3.15-1.24.amzn1.x86_64
php73-embedded-7.3.15-1.24.amzn1.x86_64
php73-tidy-7.3.15-1.24.amzn1.x86_64
php73-recode-7.3.15-1.24.amzn1.x86_64
php73-bcmath-7.3.15-1.24.amzn1.x86_64
php73-gmp-7.3.15-1.24.amzn1.x86_64
php73-pspell-7.3.15-1.24.amzn1.x86_64
php73-opcache-7.3.15-1.24.amzn1.x86_64
php73-pgsql-7.3.15-1.24.amzn1.x86_64
php73-intl-7.3.15-1.24.amzn1.x86_64
php73-ldap-7.3.15-1.24.amzn1.x86_64
php73-json-7.3.15-1.24.amzn1.x86_64
php73-snmp-7.3.15-1.24.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/ALAS-2020-1351.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU25594
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7062
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in session.c when handling file uploads. A remote attacker can send a specially crafted HTTP POST request to the affected application and perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
php73-devel-7.3.15-1.24.amzn1.i686
php73-gmp-7.3.15-1.24.amzn1.i686
php73-intl-7.3.15-1.24.amzn1.i686
php73-soap-7.3.15-1.24.amzn1.i686
php73-pdo-7.3.15-1.24.amzn1.i686
php73-enchant-7.3.15-1.24.amzn1.i686
php73-xml-7.3.15-1.24.amzn1.i686
php73-dba-7.3.15-1.24.amzn1.i686
php73-imap-7.3.15-1.24.amzn1.i686
php73-bcmath-7.3.15-1.24.amzn1.i686
php73-recode-7.3.15-1.24.amzn1.i686
php73-ldap-7.3.15-1.24.amzn1.i686
php73-odbc-7.3.15-1.24.amzn1.i686
php73-mysqlnd-7.3.15-1.24.amzn1.i686
php73-gd-7.3.15-1.24.amzn1.i686
php73-xmlrpc-7.3.15-1.24.amzn1.i686
php73-opcache-7.3.15-1.24.amzn1.i686
php73-fpm-7.3.15-1.24.amzn1.i686
php73-process-7.3.15-1.24.amzn1.i686
php73-cli-7.3.15-1.24.amzn1.i686
php73-pgsql-7.3.15-1.24.amzn1.i686
php73-embedded-7.3.15-1.24.amzn1.i686
php73-mbstring-7.3.15-1.24.amzn1.i686
php73-snmp-7.3.15-1.24.amzn1.i686
php73-debuginfo-7.3.15-1.24.amzn1.i686
php73-pspell-7.3.15-1.24.amzn1.i686
php73-common-7.3.15-1.24.amzn1.i686
php73-pdo-dblib-7.3.15-1.24.amzn1.i686
php73-json-7.3.15-1.24.amzn1.i686
php73-7.3.15-1.24.amzn1.i686
php73-tidy-7.3.15-1.24.amzn1.i686
php73-dbg-7.3.15-1.24.amzn1.i686
src:
php73-7.3.15-1.24.amzn1.src
x86_64:
php73-mbstring-7.3.15-1.24.amzn1.x86_64
php73-odbc-7.3.15-1.24.amzn1.x86_64
php73-pdo-7.3.15-1.24.amzn1.x86_64
php73-debuginfo-7.3.15-1.24.amzn1.x86_64
php73-mysqlnd-7.3.15-1.24.amzn1.x86_64
php73-7.3.15-1.24.amzn1.x86_64
php73-soap-7.3.15-1.24.amzn1.x86_64
php73-imap-7.3.15-1.24.amzn1.x86_64
php73-process-7.3.15-1.24.amzn1.x86_64
php73-gd-7.3.15-1.24.amzn1.x86_64
php73-cli-7.3.15-1.24.amzn1.x86_64
php73-common-7.3.15-1.24.amzn1.x86_64
php73-devel-7.3.15-1.24.amzn1.x86_64
php73-enchant-7.3.15-1.24.amzn1.x86_64
php73-pdo-dblib-7.3.15-1.24.amzn1.x86_64
php73-dba-7.3.15-1.24.amzn1.x86_64
php73-xml-7.3.15-1.24.amzn1.x86_64
php73-xmlrpc-7.3.15-1.24.amzn1.x86_64
php73-dbg-7.3.15-1.24.amzn1.x86_64
php73-fpm-7.3.15-1.24.amzn1.x86_64
php73-embedded-7.3.15-1.24.amzn1.x86_64
php73-tidy-7.3.15-1.24.amzn1.x86_64
php73-recode-7.3.15-1.24.amzn1.x86_64
php73-bcmath-7.3.15-1.24.amzn1.x86_64
php73-gmp-7.3.15-1.24.amzn1.x86_64
php73-pspell-7.3.15-1.24.amzn1.x86_64
php73-opcache-7.3.15-1.24.amzn1.x86_64
php73-pgsql-7.3.15-1.24.amzn1.x86_64
php73-intl-7.3.15-1.24.amzn1.x86_64
php73-ldap-7.3.15-1.24.amzn1.x86_64
php73-json-7.3.15-1.24.amzn1.x86_64
php73-snmp-7.3.15-1.24.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/ALAS-2020-1351.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU25592
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7063
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to incorrect default permissions for files and folders that are set during the Phar::buildFromIterator() call when adding files into tar archive. A local user can extract files from tar archive and gain access to otherwise restricted information.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
php73-devel-7.3.15-1.24.amzn1.i686
php73-gmp-7.3.15-1.24.amzn1.i686
php73-intl-7.3.15-1.24.amzn1.i686
php73-soap-7.3.15-1.24.amzn1.i686
php73-pdo-7.3.15-1.24.amzn1.i686
php73-enchant-7.3.15-1.24.amzn1.i686
php73-xml-7.3.15-1.24.amzn1.i686
php73-dba-7.3.15-1.24.amzn1.i686
php73-imap-7.3.15-1.24.amzn1.i686
php73-bcmath-7.3.15-1.24.amzn1.i686
php73-recode-7.3.15-1.24.amzn1.i686
php73-ldap-7.3.15-1.24.amzn1.i686
php73-odbc-7.3.15-1.24.amzn1.i686
php73-mysqlnd-7.3.15-1.24.amzn1.i686
php73-gd-7.3.15-1.24.amzn1.i686
php73-xmlrpc-7.3.15-1.24.amzn1.i686
php73-opcache-7.3.15-1.24.amzn1.i686
php73-fpm-7.3.15-1.24.amzn1.i686
php73-process-7.3.15-1.24.amzn1.i686
php73-cli-7.3.15-1.24.amzn1.i686
php73-pgsql-7.3.15-1.24.amzn1.i686
php73-embedded-7.3.15-1.24.amzn1.i686
php73-mbstring-7.3.15-1.24.amzn1.i686
php73-snmp-7.3.15-1.24.amzn1.i686
php73-debuginfo-7.3.15-1.24.amzn1.i686
php73-pspell-7.3.15-1.24.amzn1.i686
php73-common-7.3.15-1.24.amzn1.i686
php73-pdo-dblib-7.3.15-1.24.amzn1.i686
php73-json-7.3.15-1.24.amzn1.i686
php73-7.3.15-1.24.amzn1.i686
php73-tidy-7.3.15-1.24.amzn1.i686
php73-dbg-7.3.15-1.24.amzn1.i686
src:
php73-7.3.15-1.24.amzn1.src
x86_64:
php73-mbstring-7.3.15-1.24.amzn1.x86_64
php73-odbc-7.3.15-1.24.amzn1.x86_64
php73-pdo-7.3.15-1.24.amzn1.x86_64
php73-debuginfo-7.3.15-1.24.amzn1.x86_64
php73-mysqlnd-7.3.15-1.24.amzn1.x86_64
php73-7.3.15-1.24.amzn1.x86_64
php73-soap-7.3.15-1.24.amzn1.x86_64
php73-imap-7.3.15-1.24.amzn1.x86_64
php73-process-7.3.15-1.24.amzn1.x86_64
php73-gd-7.3.15-1.24.amzn1.x86_64
php73-cli-7.3.15-1.24.amzn1.x86_64
php73-common-7.3.15-1.24.amzn1.x86_64
php73-devel-7.3.15-1.24.amzn1.x86_64
php73-enchant-7.3.15-1.24.amzn1.x86_64
php73-pdo-dblib-7.3.15-1.24.amzn1.x86_64
php73-dba-7.3.15-1.24.amzn1.x86_64
php73-xml-7.3.15-1.24.amzn1.x86_64
php73-xmlrpc-7.3.15-1.24.amzn1.x86_64
php73-dbg-7.3.15-1.24.amzn1.x86_64
php73-fpm-7.3.15-1.24.amzn1.x86_64
php73-embedded-7.3.15-1.24.amzn1.x86_64
php73-tidy-7.3.15-1.24.amzn1.x86_64
php73-recode-7.3.15-1.24.amzn1.x86_64
php73-bcmath-7.3.15-1.24.amzn1.x86_64
php73-gmp-7.3.15-1.24.amzn1.x86_64
php73-pspell-7.3.15-1.24.amzn1.x86_64
php73-opcache-7.3.15-1.24.amzn1.x86_64
php73-pgsql-7.3.15-1.24.amzn1.x86_64
php73-intl-7.3.15-1.24.amzn1.x86_64
php73-ldap-7.3.15-1.24.amzn1.x86_64
php73-json-7.3.15-1.24.amzn1.x86_64
php73-snmp-7.3.15-1.24.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttp://alas.aws.amazon.com/ALAS-2020-1351.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.