Ubuntu Security Notice USN-2344-1
9th September, 2014
php5 vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
php5 could be made to crash or run programs if it received
specially crafted network traffic.
Software description
- php5
– HTML-embedded scripting language interpreter
Details
It was discovered that the Fileinfo component in php5 contains an integer
overflow. An attacker could use this flaw to cause a denial of service
or possibly execute arbitrary code via a crafted CDF file. (CVE-2014-3587)
It was discovered that the php_parserr function contains multiple buffer
overflows. An attacker could use this flaw to cause a denial of service
or possibly execute arbitrary code via crafted DNS records. (CVE-2014-3597)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.04 LTS:
-
php5
5.5.9+dfsg-1ubuntu4.4
-
libapache2-mod-php5
5.5.9+dfsg-1ubuntu4.4
-
php5-fpm
5.5.9+dfsg-1ubuntu4.4
-
php5-cgi
5.5.9+dfsg-1ubuntu4.4
- Ubuntu 12.04 LTS:
-
php5
5.3.10-1ubuntu3.14
-
libapache2-mod-php5
5.3.10-1ubuntu3.14
-
php5-fpm
5.3.10-1ubuntu3.14
-
php5-cgi
5.3.10-1ubuntu3.14
- Ubuntu 10.04 LTS:
-
php5
5.3.2-1ubuntu4.27
-
libapache2-mod-php5
5.3.2-1ubuntu4.27
-
php5-cgi
5.3.2-1ubuntu4.27
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Apache or
php5-fpm to make all the necessary changes.