Korean
<< Back
VID 22770
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.30 The PHP versions are affected by multiple vulnerabilities :

- A floating pointer exception flaw exists in the exif_convert_any_to_int() function in exif.c that is triggered when handling TIFF and JPEG image tags. An unauthenticated, remote attacker can exploit this to cause a crash, resulting in a denial of service condition. (CVE-2016-10158)

- An integer overflow condition exists in the phar_parse_pharfile() function in phar.c due to improper validation when handling phar archives. An unauthenticated, remote attacker can exploit this to cause a crash, resulting in a denial of service condition. (CVE-2016-10159)

- An off-by-one overflow condition exists in the phar_parse_pharfile() function in phar.c due to improper parsing of phar archives. An unauthenticated, remote attacker can exploit this to cause a crash, resulting in a denial of service condition. (CVE-2016-10160)

- An out-of-bounds read error exists in the finish_nested_data() function in var_unserializer.c due to improper validation of unserialized data. An unauthenticated, remote attacker can exploit this to cause a crash, resulting in a denial of service condition or the disclosure of memory contents. (CVE-2016-10161)

* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.

* References:
http://www.php.net/ChangeLog-5.php#5.6.30

* Platforms Affected:
PHP Prior to 5.6.30
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.6.30 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161 (CVE)
Related URL 95764,95768,95774,95783 (SecurityFocus)
Related URL (ISS)