Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2022-31628 CVE-2022-31629 CVE-2022-31631 CVE-2023-0568 CVE-2023-0662 |
CWE-ID | CWE-835 CWE-254 CWE-190 CWE-787 CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system php7.0 (Ubuntu package) Operating systems & Components / Operating system package or component php7.0-zip (Ubuntu package) Operating systems & Components / Operating system package or component libapache2-mod-php7.0 (Ubuntu package) Operating systems & Components / Operating system package or component php7.0-sqlite3 (Ubuntu package) Operating systems & Components / Operating system package or component php7.0-cli (Ubuntu package) Operating systems & Components / Operating system package or component php7.0-fpm (Ubuntu package) Operating systems & Components / Operating system package or component php7.0-cgi (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU67755
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-31628
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the phar uncompressor code when processing "quines" gzip files. A remote attacker can pass a specially crafted archive to the application, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package php7.0 to the latest version.
Vulnerable software versionsUbuntu: 16.04
php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-zip (Ubuntu package): before Ubuntu Pro
libapache2-mod-php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-sqlite3 (Ubuntu package): before Ubuntu Pro
php7.0-cli (Ubuntu package): before Ubuntu Pro
php7.0-fpm (Ubuntu package): before Ubuntu Pro
php7.0-cgi (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-5905-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67756
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-31629
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to the way PHP handles HTTP variable names. A remote attacker can set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
MitigationUpdate the affected package php7.0 to the latest version.
Vulnerable software versionsUbuntu: 16.04
php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-zip (Ubuntu package): before Ubuntu Pro
libapache2-mod-php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-sqlite3 (Ubuntu package): before Ubuntu Pro
php7.0-cli (Ubuntu package): before Ubuntu Pro
php7.0-fpm (Ubuntu package): before Ubuntu Pro
php7.0-cgi (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-5905-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU70788
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-31631
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to integer overflow when processing untrusted input within the PDO::quote() in PDO_SQLite. A remote attacker can pass a specially crafted input to the application that after being processed by the affected PDO::quote() method will return a quoted string, which can result in a SQL injection. MitigationUpdate the affected package php7.0 to the latest version.
Vulnerable software versionsUbuntu: 16.04
php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-zip (Ubuntu package): before Ubuntu Pro
libapache2-mod-php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-sqlite3 (Ubuntu package): before Ubuntu Pro
php7.0-cli (Ubuntu package): before Ubuntu Pro
php7.0-fpm (Ubuntu package): before Ubuntu Pro
php7.0-cgi (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-5905-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72167
Risk: Medium
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-0568
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in fopen_wrappers.c. A remote attacker can pass a specially crafted filename to the affected application, trigger a one-byte buffer overflow and crash the application or potentially execute arbitrary code.
MitigationUpdate the affected package php7.0 to the latest version.
Vulnerable software versionsUbuntu: 16.04
php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-zip (Ubuntu package): before Ubuntu Pro
libapache2-mod-php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-sqlite3 (Ubuntu package): before Ubuntu Pro
php7.0-cli (Ubuntu package): before Ubuntu Pro
php7.0-fpm (Ubuntu package): before Ubuntu Pro
php7.0-cgi (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-5905-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72165
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-0662
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when parsing multipart request body. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package php7.0 to the latest version.
Vulnerable software versionsUbuntu: 16.04
php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-zip (Ubuntu package): before Ubuntu Pro
libapache2-mod-php7.0 (Ubuntu package): before Ubuntu Pro
php7.0-sqlite3 (Ubuntu package): before Ubuntu Pro
php7.0-cli (Ubuntu package): before Ubuntu Pro
php7.0-fpm (Ubuntu package): before Ubuntu Pro
php7.0-cgi (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-5905-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.