Ubuntu update for php7.4



Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-4900
CVE-2024-2756
CVE-2024-3096
CWE-ID CWE-119
CWE-254
CWE-287
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

php7.4-xml (Ubuntu package)
Operating systems & Components / Operating system package or component

php7.4-fpm (Ubuntu package)
Operating systems & Components / Operating system package or component

php7.4-cli (Ubuntu package)
Operating systems & Components / Operating system package or component

php7.4-cgi (Ubuntu package)
Operating systems & Components / Operating system package or component

php7.4 (Ubuntu package)
Operating systems & Components / Operating system package or component

libapache2-mod-php7.4 (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.1-xml (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.1 (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.2-xml (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.2-fpm (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.2-cli (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.2-cgi (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.2 (Ubuntu package)
Operating systems & Components / Operating system package or component

libapache2-mod-php8.2 (Ubuntu package)
Operating systems & Components / Operating system package or component

php8.1-fpm (Ubuntu package)
Other

php8.1-cli (Ubuntu package)
Other

php8.1-cgi (Ubuntu package)
Other

libapache2-mod-php8.1 (Ubuntu package)
Other

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU74185

Risk: Low

CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-4900

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the php_cli_server_startup_workers() function in sapi/cli/php_cli_server.c when processing PHP_CLI_SERVER_WORKERS environment variable. A local user can trigger memory corruption and execute arbitrary code on the target system.


Mitigation

Update the affected package php7.4 to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 23.10

php7.4-xml (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

php8.1-xml (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.2-xml (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-fpm (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cli (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cgi (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

libapache2-mod-php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6757-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Security features bypass

EUVDB-ID: #VU88483

Risk: Low

CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-2756

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to the way PHP handles HTTP variable names. A remote attacker can set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.

Note, the vulnerability exists due to incomplete fix for #VU67756 (CVE-2022-31629).

Mitigation

Update the affected package php7.4 to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 23.10

php7.4-xml (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

php8.1-xml (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.2-xml (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-fpm (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cli (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cgi (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

libapache2-mod-php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6757-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Authentication

EUVDB-ID: #VU88484

Risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-3096

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in within the password_verify() function, which can erroneously return true. A remote attacker can bypass implemented authentication based on the vulnerable function and gain unauthorized access to the web application.

Mitigation

Update the affected package php7.4 to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 23.10

php7.4-xml (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.22

php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.22

php8.1-xml (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.17

php8.2-xml (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-fpm (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cli (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2-cgi (Ubuntu package): before 8.2.10-2ubuntu2.1

php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

libapache2-mod-php8.2 (Ubuntu package): before 8.2.10-2ubuntu2.1

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6757-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###