CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

PHP Stack-Based Buffer Overflow Multiple Vunerabilities——漏洞银行丨0DAY BANK

2016年8月25日 2093点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

PHP is a general purpose scripting language that is especially suited for web development and can be embedded into HTML.

PHP has been reported to be vulnerable to the following issues:
- An error exist with the virtual_file_ex function. Specifically, the function defines the "path_length" variable as a signed integer and is not checked for negative values. (CVE-2016-6289,)
- An Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c. The error occurs with how the "php_stream_zip_opener" function fails to check the path_len variable value when PHP handles a zip stream. (CVE-2016-6297)

Affected Versions:
PHP version before 5.5.x before 5.5.38, PHP version 5.6.x before 5.6.24, and PHP version 7.x before 7.0.9.

漏洞危害

Successful exploitation of this vulnerability will allow an attacker to conduct denial of service or possibly execute arbitrary code on the targeted host via a crafted extract operation on a ZIP archive.

解决方案

PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities.
Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

PHP ChangeLog 5.X: PHP 5.x

PHP ChangeLog 7.X: PHP 7.x

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me