Security update for PHP 5.3

SUSE Security Update: Security update for PHP 5.3
Announcement ID: SUSE-SU-2014:0938-1
Rating: moderate
References: #884986 #884987 #884989 #884990 #884991 #884992 #885961 #886059 #886060
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3

  • An update that fixes 9 vulnerabilities is now available.

    Description:


    PHP 5.3 has been updated to fix several security problems:

    *

    CVE-2014-3515: The SPL component in PHP incorrectly anticipated that
    certain data structures will have the array data type after
    unserialization, which allowed remote attackers to execute arbitrary code
    via a crafted string that triggers use of a Hashtable destructor, related
    to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.

    *

    CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file
    before 5.19, as used in the Fileinfo component in PHP allowed remote
    attackers to cause a denial of service (assertion failure and application
    exit) via a crafted CDF file.

    *

    CVE-2014-3478: Buffer overflow in the mconvert function in
    softmagic.c in file before 5.19, as used in the Fileinfo component in PHP
    allowed remote attackers to cause a denial of service (application crash)
    via a crafted Pascal string in a FILE_PSTRING conversion.

    *

    CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file
    before 5.19, as used in the Fileinfo component in PHP relied on incorrect
    sector-size data, which allowed remote attackers to cause a denial of
    service (application crash) via a crafted stream offset in a CDF file.

    *

    CVE-2014-3480: The cdf_count_chain function in cdf.c in file before
    5.19, as used in the Fileinfo component in PHP did not properly validate
    sector-count data, which allowed remote attackers to cause a denial of
    service (application crash) via a crafted CDF file.

    *

    CVE-2014-3487: The cdf_read_property_info function in file before
    5.19, as used in the Fileinfo component in PHP did not properly validate a
    stream offset, which allowed remote attackers to cause a denial of service
    (application crash) via a crafted CDF file.

    *

    CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c
    in the SPL component in PHP allowed context-dependent attackers to cause a
    denial of service or possibly have unspecified other impact via crafted
    iterator usage within applications in certain web-hosting environments.

    *

    CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c
    in the SPL component in PHP allowed context-dependent attackers to cause a
    denial of service or possibly have unspecified other impact via crafted
    ArrayIterator usage within applications in certain web-hosting
    environments.

    *

    CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in
    PHP did not ensure use of the string data type for the PHP_AUTH_PW,
    PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow
    context-dependent attackers to obtain sensitive information from process
    memory by using the integer data type with crafted values, related to a
    "type confusion" vulnerability, as demonstrated by reading a private SSL
    key in an Apache HTTP Server web-hosting environment with mod_ssl and a
    PHP 5.3.x mod_php.

    Security Issues:

    * CVE-2014-0207

    * CVE-2014-3478

    * CVE-2014-3479

    * CVE-2014-3480

    * CVE-2014-3487

    * CVE-2014-3515

    * CVE-2014-4670

    * CVE-2014-4698

    * CVE-2014-4721

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-apache2-mod_php53-9537
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-apache2-mod_php53-9537
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-apache2-mod_php53-9537

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • php53-devel-5.3.17-0.27.1
      • php53-imap-5.3.17-0.27.1
      • php53-posix-5.3.17-0.27.1
      • php53-readline-5.3.17-0.27.1
      • php53-sockets-5.3.17-0.27.1
      • php53-sqlite-5.3.17-0.27.1
      • php53-tidy-5.3.17-0.27.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
      • apache2-mod_php53-5.3.17-0.27.1
      • php53-5.3.17-0.27.1
      • php53-bcmath-5.3.17-0.27.1
      • php53-bz2-5.3.17-0.27.1
      • php53-calendar-5.3.17-0.27.1
      • php53-ctype-5.3.17-0.27.1
      • php53-curl-5.3.17-0.27.1
      • php53-dba-5.3.17-0.27.1
      • php53-dom-5.3.17-0.27.1
      • php53-exif-5.3.17-0.27.1
      • php53-fastcgi-5.3.17-0.27.1
      • php53-fileinfo-5.3.17-0.27.1
      • php53-ftp-5.3.17-0.27.1
      • php53-gd-5.3.17-0.27.1
      • php53-gettext-5.3.17-0.27.1
      • php53-gmp-5.3.17-0.27.1
      • php53-iconv-5.3.17-0.27.1
      • php53-intl-5.3.17-0.27.1
      • php53-json-5.3.17-0.27.1
      • php53-ldap-5.3.17-0.27.1
      • php53-mbstring-5.3.17-0.27.1
      • php53-mcrypt-5.3.17-0.27.1
      • php53-mysql-5.3.17-0.27.1
      • php53-odbc-5.3.17-0.27.1
      • php53-openssl-5.3.17-0.27.1
      • php53-pcntl-5.3.17-0.27.1
      • php53-pdo-5.3.17-0.27.1
      • php53-pear-5.3.17-0.27.1
      • php53-pgsql-5.3.17-0.27.1
      • php53-pspell-5.3.17-0.27.1
      • php53-shmop-5.3.17-0.27.1
      • php53-snmp-5.3.17-0.27.1
      • php53-soap-5.3.17-0.27.1
      • php53-suhosin-5.3.17-0.27.1
      • php53-sysvmsg-5.3.17-0.27.1
      • php53-sysvsem-5.3.17-0.27.1
      • php53-sysvshm-5.3.17-0.27.1
      • php53-tokenizer-5.3.17-0.27.1
      • php53-wddx-5.3.17-0.27.1
      • php53-xmlreader-5.3.17-0.27.1
      • php53-xmlrpc-5.3.17-0.27.1
      • php53-xmlwriter-5.3.17-0.27.1
      • php53-xsl-5.3.17-0.27.1
      • php53-zip-5.3.17-0.27.1
      • php53-zlib-5.3.17-0.27.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • apache2-mod_php53-5.3.17-0.27.1
      • php53-5.3.17-0.27.1
      • php53-bcmath-5.3.17-0.27.1
      • php53-bz2-5.3.17-0.27.1
      • php53-calendar-5.3.17-0.27.1
      • php53-ctype-5.3.17-0.27.1
      • php53-curl-5.3.17-0.27.1
      • php53-dba-5.3.17-0.27.1
      • php53-dom-5.3.17-0.27.1
      • php53-exif-5.3.17-0.27.1
      • php53-fastcgi-5.3.17-0.27.1
      • php53-fileinfo-5.3.17-0.27.1
      • php53-ftp-5.3.17-0.27.1
      • php53-gd-5.3.17-0.27.1
      • php53-gettext-5.3.17-0.27.1
      • php53-gmp-5.3.17-0.27.1
      • php53-iconv-5.3.17-0.27.1
      • php53-intl-5.3.17-0.27.1
      • php53-json-5.3.17-0.27.1
      • php53-ldap-5.3.17-0.27.1
      • php53-mbstring-5.3.17-0.27.1
      • php53-mcrypt-5.3.17-0.27.1
      • php53-mysql-5.3.17-0.27.1
      • php53-odbc-5.3.17-0.27.1
      • php53-openssl-5.3.17-0.27.1
      • php53-pcntl-5.3.17-0.27.1
      • php53-pdo-5.3.17-0.27.1
      • php53-pear-5.3.17-0.27.1
      • php53-pgsql-5.3.17-0.27.1
      • php53-pspell-5.3.17-0.27.1
      • php53-shmop-5.3.17-0.27.1
      • php53-snmp-5.3.17-0.27.1
      • php53-soap-5.3.17-0.27.1
      • php53-suhosin-5.3.17-0.27.1
      • php53-sysvmsg-5.3.17-0.27.1
      • php53-sysvsem-5.3.17-0.27.1
      • php53-sysvshm-5.3.17-0.27.1
      • php53-tokenizer-5.3.17-0.27.1
      • php53-wddx-5.3.17-0.27.1
      • php53-xmlreader-5.3.17-0.27.1
      • php53-xmlrpc-5.3.17-0.27.1
      • php53-xmlwriter-5.3.17-0.27.1
      • php53-xsl-5.3.17-0.27.1
      • php53-zip-5.3.17-0.27.1
      • php53-zlib-5.3.17-0.27.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-0207.html
    • http://support.novell.com/security/cve/CVE-2014-3478.html
    • http://support.novell.com/security/cve/CVE-2014-3479.html
    • http://support.novell.com/security/cve/CVE-2014-3480.html
    • http://support.novell.com/security/cve/CVE-2014-3487.html
    • http://support.novell.com/security/cve/CVE-2014-3515.html
    • http://support.novell.com/security/cve/CVE-2014-4670.html
    • http://support.novell.com/security/cve/CVE-2014-4698.html
    • http://support.novell.com/security/cve/CVE-2014-4721.html
    • https://bugzilla.novell.com/884986
    • https://bugzilla.novell.com/884987
    • https://bugzilla.novell.com/884989
    • https://bugzilla.novell.com/884990
    • https://bugzilla.novell.com/884991
    • https://bugzilla.novell.com/884992
    • https://bugzilla.novell.com/885961
    • https://bugzilla.novell.com/886059
    • https://bugzilla.novell.com/886060
    • http://download.suse.com/patch/finder/?keywords=74f92bf84c32eeb37f3d82282f403b49