The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
Monthly Archives: June 2015
CVE-2015-4022
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
CVE-2015-4024
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
CVE-2015-4025
PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4026
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4147
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a “type confusion” issue.
CVE-2015-4148
The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a “type confusion” issue.
NEW VMSA-2015-0004 – VMware Workstation, Fusion and Horizon View Client updates address critical security issues
Posted by VMware Security Response Center on Jun 09
————————————————————————
VMware Security Advisory
Advisory ID: VMSA-2015-0004
Synopsis: VMware Workstation, Fusion and Horizon View Client updates
address critical security issues
Issue Date: 2015-06-09
Updated on: 2015-06-09 (Initial Advisory)
CVE number: CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338,
CVE-2015-2339, CVE-2015-2340,…
NEW VMSA-2015-0004 – VMware Workstation, Fusion and Horizon View Client updates address critical security issues
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2015-0004
Synopsis: VMware Workstation, Fusion and Horizon View Client updates
address critical security issues
Issue Date: 2015-06-09
Updated on: 2015-06-09 (Initial Advisory)
CVE number: CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338,
CVE-2015-2339, CVE-2015-2340, CVE-2015-2341
1. Summary
VMware Workstation, Fusion and Horizon View Client updates address
critical security issues.
2. Relevant Releases
VMware Workstation prior to version 11.1.1
VMware Workstation prior to version 10.0.6
VMware Player prior to version 7.1.1
VMware Player prior to version 6.0.6
VMware Fusion prior to version 7.0.1
VMware Fusion prior to version 6.0.6
VMware Horizon Client for Windows prior to version 3.4.0
VMware Horizon Client for Windows prior to version 3.2.1
VMware Horizon Client for Windows (with local mode) prior to version
5.4.1
3. Problem Description
a. VMware Workstation and Horizon Client memory manipulation issues
VMware Workstation and Horizon Client TPView.ddl and TPInt.dll
incorrectly handle memory allocation. On Workstation, this may
allow a guest to execute code or perform a Denial of Service on
the Windows OS that runs Workstation. In the case of a Horizon
Client, this may allow a View desktop to execute code or perform
a Denial of Service on the Windows OS that runs the Horizon Client.
VMware would like to thank Kostya Kortchinsky of the Google
Security Team for reporting these issues to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2012-0897 and CVE-2015-2336
(TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339
(TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and
CVE-2015-2340 (TPInt.dll DoS) to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch**
============= ======= ======= =================
VMware Workstation 11.x Windows 11.1.1
VMware Workstation 10.x Windows 10.0.6
VMware Player 7.x Windows 7.1.1
VMware Player 6.x Windows 6.0.6
VMware Horizon Client for 3.3.x Windows 3.4.0
Windows
VMware Horizon Client for 3.2.x Windows 3.2.1
Windows
VMware Horizon Client for 5.x Windows 5.4.2
Windows (with local mode)
b. VMware Workstation, Player, and Fusion Denial of Service
vulnerability
VMware Workstation, Player, and Fusion contain an input
validation issue on an RPC command. This issue may allow
for a Denial of Service of the Guest Operating System (32-bit) or
a Denial of Service of the Host Operating System (64-bit).
VMware would like to thank Peter Kamensky from Digital
Security for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-2341 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.6
Fusion 7.x OSX 7.0.1
Fusion 6.x OSX 6.0.6
4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
VMware Workstation 11.1.1, 10.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
VMware Player 7.1.1, 6.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.0.1, 6.0.6
https://www.vmware.com/go/downloadfusion
VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1
Downloads and Documentation:
https://www.vmware.com/go/viewclients
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2341
- ------------------------------------------------------------------------
6. Change log
2015-06-09 VMSA-2015-0004
Initial security advisory in conjunction with the release of VMware
Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8
wj8DBQFVdx3oDEcm8Vbi9kMRAngXAKClezVd4z7zQSx7oN2sY/e4xL2yQACfdjgt
xZFTQoodunKFGfkCMqJ13M8=
=z/Tn
-----END PGP SIGNATURE-----
Adobe Releases Security Updates for Flash Player
Original release date: June 09, 2015
Adobe has released security updates to address multiple vulnerabilities in Flash Player for Windows, Macintosh, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review Adobe Security Bulletin APSB15-11 and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.