Amazon Linux AMI update for php8.1



Risk Critical
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2023-3247
CVE-2023-3823
CVE-2023-3824
CWE-ID CWE-330
CWE-611
CWE-119
Exploitation vector Network
Public exploit Vulnerability #3 is being exploited in the wild.
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

php8.1
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Use of insufficiently random values

EUVDB-ID: #VU77112

Risk: Medium

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3247

CWE-ID: CWE-330 - Use of Insufficiently Random Values

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication.

The vulnerability exists due to a missing error check and insufficient random bytes in HTTP Digest authentication for SOAP. A remote attacker can perform a brute-force attack and bypass authentication process.

Mitigation

Update the affected packages:

aarch64:
    php8.1-opcache-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-devel-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-8.1.22-1.amzn2023.0.1.aarch64

src:
    php8.1-8.1.22-1.amzn2023.0.1.src

x86_64:
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-devel-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-8.1.22-1.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

php8.1: before 8.1.22-1

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-325.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) XML External Entity injection

EUVDB-ID: #VU78977

Risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-3823

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote attacker can pass a specially crafted XML code to the affected application and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.

Mitigation

Update the affected packages:

aarch64:
    php8.1-opcache-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-devel-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-8.1.22-1.amzn2023.0.1.aarch64

src:
    php8.1-8.1.22-1.amzn2023.0.1.src

x86_64:
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-devel-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-8.1.22-1.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

php8.1: before 8.1.22-1

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-325.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU78978

Risk: Critical

CVSSv4.0: 9.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:A/U:Red]

CVE-ID: CVE-2023-3824

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the phar_dir_read() function. A remote attacker can force the application to open a specially crafted .phar archive,  trigger memory corruption and execute arbitrary code on the target system.

Mitigation

Update the affected packages:

aarch64:
    php8.1-opcache-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-devel-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gd-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-cli-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-dba-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-xml-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-common-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.aarch64
    php8.1-8.1.22-1.amzn2023.0.1.aarch64

src:
    php8.1-8.1.22-1.amzn2023.0.1.src

x86_64:
    php8.1-fpm-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-intl-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pdo-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pgsql-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debugsource-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-cli-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-embedded-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-fpm-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-soap-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-opcache-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mbstring-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-mysqlnd-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-common-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-devel-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dbg-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-xml-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ffi-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-process-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gd-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-odbc-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-ldap-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-gmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-bcmath-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-dba-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-tidy-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-snmp-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-debuginfo-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-enchant-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-pspell-8.1.22-1.amzn2023.0.1.x86_64
    php8.1-8.1.22-1.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

php8.1: before 8.1.22-1

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-325.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###