ID

VAR-201503-0206


CVE

CVE-2015-2301


TITLE

PHP of phar_object.c of phar_rename_archive Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-002002

DESCRIPTION

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file. PHP of phar_object.c of phar_rename_archive Function uses freed memory (Use-after-free) Service disruption (DoS) There are vulnerabilities that are subject to unspecified impact, such as being put into a state. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. PHP is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: php54 security and bug fix update Advisory ID: RHSA-2015:1066-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1066.html Issue date: 2015-06-04 CVE Names: CVE-2014-8142 CVE-2014-9427 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0273 CVE-2015-1351 CVE-2015-2301 CVE-2015-2305 CVE-2015-2348 CVE-2015-2787 CVE-2015-4147 CVE-2015-4148 ===================================================================== 1. Summary: Updated php54 collection packages that fix multiple security issues and several bugs are now available as part of Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The php54 packages provide a recent stable release of PHP with the PEAR 1.9.4, APC 3.1.15, and memcache 3.0.8 PECL extensions, and a number of additional utilities. The php54 packages have been upgraded to upstream version 5.4.40, which provides a number of bug fixes over the version shipped in Red Hat Software Collections 1. (BZ#1168193) The following security issues were fixed in the php54-php component: An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A heap buffer overflow flaw was found in PHP's regular expression extension. An attacker able to make PHP process a specially crafted regular expression pattern could cause it to crash and possibly execute arbitrary code. (CVE-2015-2305) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) A use-after-free flaw was found in PHP's phar (PHP Archive) extension. An attacker able to trigger certain error condition in phar archive processing could possibly use this flaw to disclose certain portions of server memory. (CVE-2015-2301) An ouf-of-bounds read flaw was found in the way the File Information (fileinfo) extension processed certain Pascal strings. A remote attacker could cause a PHP application to crash if it used fileinfo to identify the type of the attacker-supplied file. (CVE-2014-9652) It was found that PHP move_uploaded_file() function did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348) A flaw was found in the way PHP handled malformed source files when running in CGI mode. A specially crafted PHP file could cause PHP CGI to crash. (CVE-2014-9427) The following security issue was fixed in the php54-php-pecl-zendopcache component: A use-after-free flaw was found in PHP's OPcache extension. This flaw could possibly lead to a disclosure of a portion of the server memory. (CVE-2015-1351) All php54 users are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the httpd service must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1055927 - REBASE to pecl/zendopcache version 7.0.4 1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize() 1178736 - CVE-2014-9427 php: out of bounds read when parsing a crafted .php file 1185397 - CVE-2015-0231 php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1185900 - CVE-2015-1351 php: use after free in opcache extension 1188599 - CVE-2014-9652 file: out of bounds read in mconvert() 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1191049 - CVE-2015-2305 regex: heap overflow in regcomp() on 32-bit architectures 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1207682 - CVE-2015-2348 php: move_uploaded_file() NUL byte injection in file name 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: php54-2.0-1.el7.src.rpm php54-php-5.4.40-1.el7.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.src.rpm x86_64: php54-2.0-1.el7.x86_64.rpm php54-php-5.4.40-1.el7.x86_64.rpm php54-php-bcmath-5.4.40-1.el7.x86_64.rpm php54-php-cli-5.4.40-1.el7.x86_64.rpm php54-php-common-5.4.40-1.el7.x86_64.rpm php54-php-dba-5.4.40-1.el7.x86_64.rpm php54-php-debuginfo-5.4.40-1.el7.x86_64.rpm php54-php-devel-5.4.40-1.el7.x86_64.rpm php54-php-enchant-5.4.40-1.el7.x86_64.rpm php54-php-fpm-5.4.40-1.el7.x86_64.rpm php54-php-gd-5.4.40-1.el7.x86_64.rpm php54-php-intl-5.4.40-1.el7.x86_64.rpm php54-php-ldap-5.4.40-1.el7.x86_64.rpm php54-php-mbstring-5.4.40-1.el7.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el7.x86_64.rpm php54-php-odbc-5.4.40-1.el7.x86_64.rpm php54-php-pdo-5.4.40-1.el7.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el7.x86_64.rpm php54-php-pgsql-5.4.40-1.el7.x86_64.rpm php54-php-process-5.4.40-1.el7.x86_64.rpm php54-php-pspell-5.4.40-1.el7.x86_64.rpm php54-php-recode-5.4.40-1.el7.x86_64.rpm php54-php-snmp-5.4.40-1.el7.x86_64.rpm php54-php-soap-5.4.40-1.el7.x86_64.rpm php54-php-xml-5.4.40-1.el7.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el7.x86_64.rpm php54-runtime-2.0-1.el7.x86_64.rpm php54-scldevel-2.0-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: php54-2.0-1.el7.src.rpm php54-php-5.4.40-1.el7.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.src.rpm x86_64: php54-2.0-1.el7.x86_64.rpm php54-php-5.4.40-1.el7.x86_64.rpm php54-php-bcmath-5.4.40-1.el7.x86_64.rpm php54-php-cli-5.4.40-1.el7.x86_64.rpm php54-php-common-5.4.40-1.el7.x86_64.rpm php54-php-dba-5.4.40-1.el7.x86_64.rpm php54-php-debuginfo-5.4.40-1.el7.x86_64.rpm php54-php-devel-5.4.40-1.el7.x86_64.rpm php54-php-enchant-5.4.40-1.el7.x86_64.rpm php54-php-fpm-5.4.40-1.el7.x86_64.rpm php54-php-gd-5.4.40-1.el7.x86_64.rpm php54-php-intl-5.4.40-1.el7.x86_64.rpm php54-php-ldap-5.4.40-1.el7.x86_64.rpm php54-php-mbstring-5.4.40-1.el7.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el7.x86_64.rpm php54-php-odbc-5.4.40-1.el7.x86_64.rpm php54-php-pdo-5.4.40-1.el7.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el7.x86_64.rpm php54-php-pgsql-5.4.40-1.el7.x86_64.rpm php54-php-process-5.4.40-1.el7.x86_64.rpm php54-php-pspell-5.4.40-1.el7.x86_64.rpm php54-php-recode-5.4.40-1.el7.x86_64.rpm php54-php-snmp-5.4.40-1.el7.x86_64.rpm php54-php-soap-5.4.40-1.el7.x86_64.rpm php54-php-xml-5.4.40-1.el7.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el7.x86_64.rpm php54-runtime-2.0-1.el7.x86_64.rpm php54-scldevel-2.0-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8142 https://access.redhat.com/security/cve/CVE-2014-9427 https://access.redhat.com/security/cve/CVE-2014-9652 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0231 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-1351 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2305 https://access.redhat.com/security/cve/CVE-2015-2348 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcBYSXlSAg2UNWIIRAoT1AJ9XFBGeD9SIxEla6ub7VHSrmJAtcgCfSjPe YJoyzmnxjsdToxpNcMlTQOw= =BUIg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6) - i386, x86_64 3. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/php-5.4.40-i486-1_slack14.1.txz: Upgraded. Please note that this package build also moves the configuration files from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.40-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.40-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.40-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.40-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.6.8-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.6.8-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 package: 2666059d6540b1b4385d25dfc5ebbe99 php-5.4.40-i486-1_slack14.0.txz Slackware x86_64 14.0 package: c146f500912ba9c7e5d652e5e3643c04 php-5.4.40-x86_64-1_slack14.0.txz Slackware 14.1 package: 9efc8a96f9a3f3261e5f640292b1b781 php-5.4.40-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 2c95e077f314f1cfa3ee83b9aba90b91 php-5.4.40-x86_64-1_slack14.1.txz Slackware -current package: 30d14f237c71fada0d594c2360a58016 n/php-5.6.8-i486-1.txz Slackware x86_64 -current package: 1a0fcc590aa4dff5de5f08293936d0d9 n/php-5.6.8-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg php-5.4.40-i486-1_slack14.1.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. For the stable distribution (wheezy), these problems have been fixed in version 5.4.39-0+deb7u1. This update also fixes a regression in the curl support introduced in DSA 3195. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your php5 packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04686230 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04686230 Version: 1 HPSBUX03337 SSRT102066 rev.1 - HP-UX Apache Web Server Suite running Apache Web Server, Tomcat v6.x, or PHP v5.4.x, Remote Denial of Service (DoS) and Other Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-06-10 Last Updated: 2015-06-10 Potential Security Impact: Remote denial of service (DoS), man-in-the-middle (MitM) attack, modification of data, local modification of data Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with the HP-UX Apache Web Server Suite, Tomcat Servlet Engine, and PHP. These could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities. HP-UX B.11.31 running HP-UX Apache Web Server Suite v4.04 or earlier HP-UX B.11.31 running HP-UX Apache Web Server v2.2.15.22 or earlier HP-UX B.11.31 running Tomcat Servlet Engine v6.0.39.03 or earlier HP-UX B.11.31 running PHP v5.4.11.04 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-5704 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-0118 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0226 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0227 (AV:N/AC:L/Au:N/C:N/I:P/A:P) 6.4 CVE-2014-0231 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-8142 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-9709 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0231 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2015-0273 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2015-1352 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-2301 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2015-2305 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-2331 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2015-2783 (AV:N/AC:M/Au:N/C:P/I:N/A:P) 5.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates to resolve the vulnerabilities. The updates are available for download from http://software.hp.com NOTE: HP-UX Web Server Suite v4.05 HPUXWSATW405 contains Apache v2.2.29.01, Tomcat Servlet Engine 6.0.43.01, PHP 5.4.40.01, and Webmin v1.070.13 HP-UX 11i Release Apache Depot name B.11.31 (11i v3 32-bit) HP_UX_11.31_HPUXWS22ATW-B405-11-31-64.depot B.11.31 (11i v3 64-bit) HP_UX_11.31_HPUXWS22ATW-B405-11-31-64.depot MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v4.05 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 ================== hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.29.01 or subsequent hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.43.01 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 10 June 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201606-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: PHP: Multiple vulnerabilities Date: June 19, 2016 Bugs: #537586, #541098, #544186, #544330, #546872, #549538, #552408, #555576, #555830, #556952, #559612, #562882, #571254, #573892, #577376 ID: 201606-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP 5.4 users should upgrade to the latest 5.5 stable branch, as PHP 5.4 is now masked in Portage: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33" All PHP 5.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.5.33" All PHP 5.6 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.19" References ========== [ 1 ] CVE-2013-6501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501 [ 2 ] CVE-2014-9705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705 [ 3 ] CVE-2014-9709 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709 [ 4 ] CVE-2015-0231 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231 [ 5 ] CVE-2015-0273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273 [ 6 ] CVE-2015-1351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351 [ 7 ] CVE-2015-1352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352 [ 8 ] CVE-2015-2301 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301 [ 9 ] CVE-2015-2348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348 [ 10 ] CVE-2015-2783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783 [ 11 ] CVE-2015-2787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787 [ 12 ] CVE-2015-3329 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329 [ 13 ] CVE-2015-3330 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330 [ 14 ] CVE-2015-4021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021 [ 15 ] CVE-2015-4022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022 [ 16 ] CVE-2015-4025 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025 [ 17 ] CVE-2015-4026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026 [ 18 ] CVE-2015-4147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147 [ 19 ] CVE-2015-4148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148 [ 20 ] CVE-2015-4642 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642 [ 21 ] CVE-2015-4643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643 [ 22 ] CVE-2015-4644 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644 [ 23 ] CVE-2015-6831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831 [ 24 ] CVE-2015-6832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832 [ 25 ] CVE-2015-6833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833 [ 26 ] CVE-2015-6834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834 [ 27 ] CVE-2015-6835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835 [ 28 ] CVE-2015-6836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836 [ 29 ] CVE-2015-6837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837 [ 30 ] CVE-2015-6838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838 [ 31 ] CVE-2015-7803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803 [ 32 ] CVE-2015-7804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201606-10 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2015-2301 // JVNDB: JVNDB-2015-002002 // BID: 73037 // VULHUB: VHN-80262 // VULMON: CVE-2015-2301 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 131577 // PACKETSTORM: 130940 // PACKETSTORM: 132263 // PACKETSTORM: 137539

AFFECTED PRODUCTS

vendor:phpmodel:phpscope:ltversion:5.5.22

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:phpmodel:phpscope:gteversion:5.5.0

Trust: 1.0

vendor:phpmodel:phpscope:gteversion:5.4.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 1.0

vendor:phpmodel:phpscope:gteversion:5.6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:phpmodel:phpscope:ltversion:5.6.6

Trust: 1.0

vendor:phpmodel:phpscope:ltversion:5.4.40

Trust: 1.0

vendor:the php groupmodel:phpscope:eqversion:5.6.6

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.6.x

Trust: 0.8

vendor:phpmodel:phpscope:eqversion:5.5.18

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.13

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.20

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.15

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.16

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.21

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.19

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.17

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.5.14

Trust: 0.6

vendor:phpmodel:phpscope:eqversion:5.6.0

Trust: 0.6

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:2.1.5

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.27

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2.77

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.68

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.64

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.9.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.8

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.12

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.11

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.9

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.8

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

sources: BID: 73037 // CNNVD: CNNVD-201503-624 // JVNDB: JVNDB-2015-002002 // NVD: CVE-2015-2301

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-2301
value: HIGH

Trust: 1.0

NVD: CVE-2015-2301
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201503-624
value: HIGH

Trust: 0.6

VULHUB: VHN-80262
value: HIGH

Trust: 0.1

VULMON: CVE-2015-2301
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-2301
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-80262
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-80262 // VULMON: CVE-2015-2301 // CNNVD: CNNVD-201503-624 // JVNDB: JVNDB-2015-002002 // NVD: CVE-2015-2301

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-002002 // NVD: CVE-2015-2301

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-624

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201503-624

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002002

PATCH

title:APPLE-SA-2015-09-30-3 OS X El Capitan 10.11url:http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html

Trust: 0.8

title:HT205267url:https://support.apple.com/en-us/HT205267

Trust: 0.8

title:HT205267url:http://support.apple.com/ja-jp/HT205267

Trust: 0.8

title:Sec Bug #68901url:https://bugs.php.net/bug.php?id=68901

Trust: 0.8

title:Fixed bug #68901 (use after free)url:http://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b

Trust: 0.8

title:Bug 1194747url:https://bugzilla.redhat.com/show_bug.cgi?id=1194747

Trust: 0.8

title:PHP 5 ChangeLogurl:http://php.net/ChangeLog-5.php

Trust: 0.8

title:php-src-php-5.6.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54699

Trust: 0.6

title:php-src-php-5.6.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54698

Trust: 0.6

title:php-src-php-5.5.22url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54697

Trust: 0.6

title:php-src-php-5.5.22url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54696

Trust: 0.6

title:php-src-php-5.4.38url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54695

Trust: 0.6

title:php-src-php-5.4.38url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54694

Trust: 0.6

title:Ubuntu Security Notice: php5 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2535-1

Trust: 0.1

title:Red Hat: CVE-2015-2301url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-2301

Trust: 0.1

title:Debian Security Advisories: DSA-3198-1 php5 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5c4d31fb1a942bdc1ee4d9ee7c751940

Trust: 0.1

title:Debian CVElist Bug Report Logs: php5: CVE-2015-2331url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=ba7729d0dba9bfe30fe987c59a0c7f95

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-509url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-509

Trust: 0.1

title:Apple: OS X El Capitan v10.11url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=e88bab658248444f5dffc23fd95859e7

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=8ad80411af3e936eb2998df70506cc71

Trust: 0.1

sources: VULMON: CVE-2015-2301 // CNNVD: CNNVD-201503-624 // JVNDB: JVNDB-2015-002002

EXTERNAL IDS

db:NVDid:CVE-2015-2301

Trust: 3.5

db:BIDid:73037

Trust: 2.1

db:SECTRACKid:1031949

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2015/03/15/6

Trust: 1.8

db:JVNid:JVNVU97220341

Trust: 0.8

db:JVNDBid:JVNDB-2015-002002

Trust: 0.8

db:CNNVDid:CNNVD-201503-624

Trust: 0.7

db:PACKETSTORMid:130940

Trust: 0.2

db:VULHUBid:VHN-80262

Trust: 0.1

db:VULMONid:CVE-2015-2301

Trust: 0.1

db:PACKETSTORMid:132161

Trust: 0.1

db:PACKETSTORMid:132618

Trust: 0.1

db:PACKETSTORMid:131577

Trust: 0.1

db:PACKETSTORMid:132263

Trust: 0.1

db:PACKETSTORMid:137539

Trust: 0.1

sources: VULHUB: VHN-80262 // VULMON: CVE-2015-2301 // BID: 73037 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 131577 // PACKETSTORM: 130940 // PACKETSTORM: 132263 // PACKETSTORM: 137539 // CNNVD: CNNVD-201503-624 // JVNDB: JVNDB-2015-002002 // NVD: CVE-2015-2301

REFERENCES

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 2.1

url:https://bugs.php.net/bug.php?id=68901

Trust: 2.1

url:http://rhn.redhat.com/errata/rhsa-2015-1135.html

Trust: 2.1

url:http://www.securityfocus.com/bid/73037

Trust: 1.9

url:https://security.gentoo.org/glsa/201606-10

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2015-1066.html

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2015-1218.html

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html

Trust: 1.8

url:http://php.net/changelog-5.php

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1194747

Trust: 1.8

url:https://support.apple.com/ht205267

Trust: 1.8

url:http://www.debian.org/security/2015/dsa-3198

Trust: 1.8

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:079

Trust: 1.8

url:http://openwall.com/lists/oss-security/2015/03/15/6

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2015-1053.html

Trust: 1.8

url:http://www.securitytracker.com/id/1031949

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2535-1

Trust: 1.8

url:http://marc.info/?l=bugtraq&m=143403519711434&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=143748090628601&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=144050155601375&w=2

Trust: 1.7

url:http://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b

Trust: 1.1

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=b2cf3f064b8f5efef89bb084521b61318c71781b

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2301

Trust: 0.9

url:http://jvn.jp/vu/jvnvu97220341/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2301

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-2301

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-9709

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2015-0231

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-0273

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-2783

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-2301

Trust: 0.3

url:http://php.net/changelog-5.php#5.5.22

Trust: 0.3

url:http://php.net/changelog-5.php#5.6.6

Trust: 0.3

url:http://www.php.net/

Trust: 0.3

url:http://seclists.org/bugtraq/2015/apr/151

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04746490

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/135

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04686230

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4148

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4147

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1351

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-9705

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2787

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2305

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2331

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1352

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-8142

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4147

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2348

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4148

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-0232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-0273

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9705

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-2787

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9709

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4021

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4026

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4022

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3329

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3330

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=143748090628601&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144050155601375&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143403519711434&amp;w=2

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2535-1/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=41307

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-1351

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9427

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9427

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2348

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-8142

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9652

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9652

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-0231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4601

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4600

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4024

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4021

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4600

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3307

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3411

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3412

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4602

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4599

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4026

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3412

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4598

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9425

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4024

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4602

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4599

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4598

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9425

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4601

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4603

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2305

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3330

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9709

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2331

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1351

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2783

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0231

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1352

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0226

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:http://software.hp.com

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5704

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0231

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2301

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1352

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2348

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9709

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6831

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0273

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4021

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6834

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4644

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4642

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6832

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6831

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4025

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4642

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2787

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3329

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1351

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4025

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4644

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9705

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6833

Trust: 0.1

sources: VULHUB: VHN-80262 // VULMON: CVE-2015-2301 // BID: 73037 // PACKETSTORM: 132161 // PACKETSTORM: 132618 // PACKETSTORM: 131577 // PACKETSTORM: 130940 // PACKETSTORM: 132263 // PACKETSTORM: 137539 // CNNVD: CNNVD-201503-624 // JVNDB: JVNDB-2015-002002 // NVD: CVE-2015-2301

CREDITS

Xinchen Hui

Trust: 0.3

sources: BID: 73037

SOURCES

db:VULHUBid:VHN-80262
db:VULMONid:CVE-2015-2301
db:BIDid:73037
db:PACKETSTORMid:132161
db:PACKETSTORMid:132618
db:PACKETSTORMid:131577
db:PACKETSTORMid:130940
db:PACKETSTORMid:132263
db:PACKETSTORMid:137539
db:CNNVDid:CNNVD-201503-624
db:JVNDBid:JVNDB-2015-002002
db:NVDid:CVE-2015-2301

LAST UPDATE DATE

2025-09-27T23:55:09.994000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-80262date:2019-10-09T00:00:00
db:VULMONid:CVE-2015-2301date:2019-10-09T00:00:00
db:BIDid:73037date:2016-07-05T21:28:00
db:CNNVDid:CNNVD-201503-624date:2022-08-17T00:00:00
db:JVNDBid:JVNDB-2015-002002date:2015-10-06T00:00:00
db:NVDid:CVE-2015-2301date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-80262date:2015-03-30T00:00:00
db:VULMONid:CVE-2015-2301date:2015-03-30T00:00:00
db:BIDid:73037date:2015-02-20T00:00:00
db:PACKETSTORMid:132161date:2015-06-04T16:15:24
db:PACKETSTORMid:132618date:2015-07-09T23:16:17
db:PACKETSTORMid:131577date:2015-04-22T20:14:00
db:PACKETSTORMid:130940date:2015-03-23T23:35:38
db:PACKETSTORMid:132263date:2015-06-11T23:41:13
db:PACKETSTORMid:137539date:2016-06-19T15:55:00
db:CNNVDid:CNNVD-201503-624date:2015-03-31T00:00:00
db:JVNDBid:JVNDB-2015-002002date:2015-04-02T00:00:00
db:NVDid:CVE-2015-2301date:2015-03-30T10:59:10.630