ID

VAR-201605-0133


CVE

CVE-2015-8865


TITLE

PHP of Fileinfo Used by components file of funcs.c of file_check_mem Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-007175

DESCRIPTION

The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. PHP is prone to a denial-of-service vulnerability. Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community; Fileinfo is one of them used to display file attributes and support batch modification of its Components of properties. The vulnerability stems from the fact that the program does not correctly handle continuation-level jumps. The following versions are affected: PHP prior to 5.5.34, 5.6.x prior to 5.6.20, 7.x prior to 7.0.5, and prior to file 5.23. This update provides the corresponding update for Ubuntu 12.04 ESM. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003 OS X El Capitan 10.11.5 and Security Update 2016-003 is now available and addresses the following: AMD Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1792 : beist and ABH of BoB AMD Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: An application may be able to determine kernel memory layout Description: An issue existed that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2016-1791 : daybreaker of Minionz apache_mod_php Available for: OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.34. These were addressed by updating PHP to version 5.5.34. CVE-ID CVE-2015-8865 CVE-2016-3141 CVE-2016-3142 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072 CVE-2016-4073 AppleGraphicsControl Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1793 : Ian Beer of Google Project Zero CVE-2016-1794 : Ian Beer of Google Project Zero AppleGraphicsPowerManagement Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1795 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro ATS Available for: OS X El Capitan v10.11 and later Impact: An application may be able to determine kernel memory layout Description: An out of bounds memory access issue was addressed through improved memory handling. CVE-ID CVE-2016-1796 : lokihardt working with Trend Micro's Zero Day Initiative ATS Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with system privileges Description: An issue existed in the sandbox policy. This was addressed by sandboxing FontValidator. CVE-ID CVE-2016-1797 : lokihardt working with Trend Micro's Zero Day Initiative Audio Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later Impact: An application may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1798 : Juwei Lin of TrendMicro Audio Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1799 : Juwei Lin of TrendMicro Captive Network Assistant Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to execute arbitrary code with user assistance Description: A custom URL scheme handling issue was addressed through improved input validation. CVE-ID CVE-2016-1800 : Apple CFNetwork Proxies Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: An information leak existed in the handling of HTTP and HTTPS requests. This issue was addressed through improved URL handling. CVE-ID CVE-2016-1801 : Alex Chapman and Paul Stone of Context Information Security CommonCrypto Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to leak sensitive user information Description: An issue existed in the handling of return values in CCCrypt. This issue was addressed through improved key length management. CVE-ID CVE-2016-1802 : Klaus Rodewig CoreCapture Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1803 : Ian Beer of Google Project Zero, daybreaker working with Trend Micro’s Zero Day Initiative CoreStorage Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A configuration issue was addressed through additional restrictions. CVE-ID CVE-2016-1805 : Stefan Esser Crash Reporter Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with root privileges Description: A configuration issue was addressed through additional restrictions. CVE-ID CVE-2016-1806 : lokihardt working with Trend Micro's Zero Day Initiative Disk Images Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to read kernel memory Description: A race condition was addressed through improved locking. CVE-ID CVE-2016-1807 : Ian Beer of Google Project Zero Disk Images Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2016-1808 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro Disk Utility Available for: OS X El Capitan v10.11 and later Impact: Disk Utility failed to compress and encrypt disk images Description: Incorrect keys were being used to encrypt disk images. This issue was addressed by updating the encryption keys. CVE-ID CVE-2016-1809 : Ast A. Moore (@astamoore) and David Foster of TechSmartKids Graphics Drivers Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1810 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro ImageIO Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted image may lead to a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1811 : Lander Brandt (@landaire) Intel Graphics Driver Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed through improved bounds checking. CVE-ID CVE-2016-1812 : Juwei Lin of TrendMicro IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to cause a denial of service Description: A null pointer dereference was addressed through improved locking. CVE-ID CVE-2016-1814 : Juwei Lin of TrendMicro IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1815 : Liang Chen, Qidan He of KeenLab, Tencent working with Trend Micro's Zero Day Initiative CVE-2016-1817 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro working with Trend Micro's Zero Day Initiative CVE-2016-1818 : Juwei Lin of TrendMicro CVE-2016-1819 : Ian Beer of Google Project Zero IOAcceleratorFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1813 : Ian Beer of Google Project Zero CVE-2016-1816 : Peter Pi (@heisecode) of Trend Micro and Juwei Lin of Trend Micro IOAudioFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-ID CVE-2016-1820 : Moony Li (@Flyic) and Jack Tang (@jacktang310) of Trend Micro working with Trend Micro’s Zero Day Initiative IOAudioFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1821 : Ian Beer of Google Project Zero IOFireWireFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1822 : CESG IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1823 : Ian Beer of Google Project Zero CVE-2016-1824 : Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1825 : Brandon Azad Kernel Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1827 : Brandon Azad CVE-2016-1828 : Brandon Azad CVE-2016-1829 : CESG CVE-2016-1830 : Brandon Azad CVE-2016-1831 : Brandon Azad Kernel Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: An integer overflow existed in dtrace. This issue was addressed through improved bounds checking. CVE-ID CVE-2016-1826 : Ben Murphy working with Trend Micro’s Zero Day Initiative libc Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1832 : Karl Williamson libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1833 : Mateusz Jurczyk CVE-2016-1834 : Apple CVE-2016-1835 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1837 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-1838 : Mateusz Jurczyk CVE-2016-1839 : Mateusz Jurczyk CVE-2016-1840 : Kostya Serebryany libxslt Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1841 : Sebastian Apelt MapKit Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: Shared links were sent with HTTP rather than HTTPS. This was addressed by enabling HTTPS for shared links. CVE-ID CVE-2016-1842 : Richard Shupak (https://www.linkedin.com/in/rshupak) Messages Available for: OS X El Capitan v10.11 and later Impact: A malicious server or user may be able to modify another user's contact list Description: A validation issue existed in roster changes. This issue was addressed through improved validation of roster sets. CVE-ID CVE-2016-1844 : Thijs Alkemade of Computest Messages Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to leak sensitive user information Description: An encoding issue existed in filename parsing. This issue was addressed through improved filename encoding. CVE-ID CVE-2016-1843 : Heige (a.k.a. SuperHei) of Knownsec 404 Security Team [http://www.knownsec.com] Multi-Touch Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1804 : Liang Chen, Yubin Fu, Marco Grassi of KeenLab, Tencent of Trend Micro's Zero Day Initiative NVIDIA Graphics Drivers Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1846 : Ian Beer of Google Project Zero OpenGL Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1847 : Tongbo Luo and Bo Qu of Palo Alto Networks QuickTime Available for: OS X El Capitan v10.11 and later Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1848 : Francis Provencher from COSIG SceneKit Available for: OS X El Capitan v10.11 and later Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1850 : Tyler Bohan of Cisco Talos Screen Lock Available for: OS X El Capitan v10.11 and later Impact: A person with physical access to a computer may be able to reset an expired password from the lock screen Description: An issue existed in the management of password profiles. This issue was addressed through improved password reset handling. CVE-ID CVE-2016-1851 : an anonymous researcher Tcl Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: A protocol security issue was addressed by disabling SSLv2. CVE-ID CVE-2016-1853 : researchers at Tel Aviv University, Münster University of Applied Sciences, Ruhr University Bochum, the University of Pennsylvania, the Hashcat project, the University of Michigan, Two Sigma, Google, and the OpenSSL project: Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt Note: OS X El Capitan 10.11.5 includes the security content of Safari 9.1.1. For further details see https://support.apple.com/en-us/HT206565 OS X El Capitan 10.11.5 and Security Update 2016-003 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJXOj0GAAoJEIOj74w0bLRGFp0QANQktsdXgOptLJWGqWXaDKmW HaY0fNyuXNLzGNH2GKQ1yXi2KjMqGnCuAwaS3Ku/4qx2Imq3X+BLLYrSOwttbAvQ yGdWaFo1ExK/WT4CI02QM7LDOZNXOyZq/ofQ4jXi/wDpuXXNV+I+RsMMUJL4Uon9 2fngj7FHXk4fvCYs9lahjv+wDGkpIcVDTU6Liqxmje2KQzShYJ8tYwwacsOSQKxk bmsUiA9q9zkGbbo7mo5WikQUO1XWaBLQiBejzJMyNEFGECtOc9B4+irTJgERTSHb igd2875EmH/sNI6WkEQNZwpMfdKBhNI/W9e/DhZVSwAydK6xt8yr0vd5ZF/M8jCU CWGzoOQI1snlr862Ccx7H+db8umu1UmDMUjz1To+hqCEhnvMW2/oRvrKtk2Q65Pu STqixhDl0HEamvX/72r7LNsZHjzmoGoKjpwjnGf0phZgSBP1bWKmhp9748Rcb12a LzwRy7KJ20W8XGGiMeqKoe4bFaBK6iBJok4+ZpROadGrxtjVumtqbZ5CrY1Hp8/F I4VMuReDqG39G4yyDeAEr9JWRdmV285Z1zaxOgd2CsPblDfEWp9HiBpC8Agd1p9x Mf/EDssinL1K7dQQPIXgGUE5S6Z2DzGEeKvHzm8kLxl0OfwntATY/mf7TM0nj4JY YyNMZcKPuYVmF3b2PAfb =P+17 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3560-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 27, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : php5 CVE ID : CVE-2015-8865 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072 CVE-2016-4073 Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The vulnerabilities are addressed by upgrading PHP to the new upstream version 5.6.20, which includes additional bug fixes. Please refer to the upstream changelog for more information: https://php.net/ChangeLog-5.php#5.6.20 For the stable distribution (jessie), these problems have been fixed in version 5.6.20+dfsg-0+deb8u1. We recommend that you upgrade your php5 packages. Background ========== file is a utility that guesses a file format by scanning binary data for patterns. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201611-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: PHP: Multiple vulnerabilities Date: November 30, 2016 Bugs: #578734, #581834, #584204, #587246, #591710, #594498, #597586, #599326 ID: 201611-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution or cause a Denial of Service condition. Background ========== PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All PHP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.28" References ========== [ 1 ] CVE-2015-8865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865 [ 2 ] CVE-2016-3074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074 [ 3 ] CVE-2016-4071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071 [ 4 ] CVE-2016-4072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072 [ 5 ] CVE-2016-4073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073 [ 6 ] CVE-2016-4537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537 [ 7 ] CVE-2016-4538 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538 [ 8 ] CVE-2016-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539 [ 9 ] CVE-2016-4540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540 [ 10 ] CVE-2016-4541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541 [ 11 ] CVE-2016-4542 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542 [ 12 ] CVE-2016-4543 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543 [ 13 ] CVE-2016-4544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544 [ 14 ] CVE-2016-5385 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385 [ 15 ] CVE-2016-6289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289 [ 16 ] CVE-2016-6290 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290 [ 17 ] CVE-2016-6291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291 [ 18 ] CVE-2016-6292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292 [ 19 ] CVE-2016-6294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294 [ 20 ] CVE-2016-6295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295 [ 21 ] CVE-2016-6296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296 [ 22 ] CVE-2016-6297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297 [ 23 ] CVE-2016-7124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124 [ 24 ] CVE-2016-7125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125 [ 25 ] CVE-2016-7126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126 [ 26 ] CVE-2016-7127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127 [ 27 ] CVE-2016-7128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128 [ 28 ] CVE-2016-7129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129 [ 29 ] CVE-2016-7130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130 [ 30 ] CVE-2016-7131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131 [ 31 ] CVE-2016-7132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132 [ 32 ] CVE-2016-7133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133 [ 33 ] CVE-2016-7134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134 [ 34 ] CVE-2016-7411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411 [ 35 ] CVE-2016-7412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412 [ 36 ] CVE-2016-7413 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413 [ 37 ] CVE-2016-7414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414 [ 38 ] CVE-2016-7416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416 [ 39 ] CVE-2016-7417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417 [ 40 ] CVE-2016-7418 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201611-22 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3686-1 June 14, 2018 file vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in file. Software Description: - file: Tool to determine file types Details: Alexander Cherepanov discovered that file incorrectly handled a large number of notes. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9620) Alexander Cherepanov discovered that file incorrectly handled certain long strings. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9620) Alexander Cherepanov discovered that file incorrectly handled certain malformed ELF files. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9653) It was discovered that file incorrectly handled certain magic files. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8865) It was discovered that file incorrectly handled certain malformed ELF files. An attacker could use this issue to cause a denial of service. (CVE-2018-10360) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: file 1:5.32-2ubuntu0.1 libmagic1 1:5.32-2ubuntu0.1 Ubuntu 17.10: file 1:5.32-1ubuntu0.1 libmagic1 1:5.32-1ubuntu0.1 Ubuntu 16.04 LTS: file 1:5.25-2ubuntu1.1 libmagic1 1:5.25-2ubuntu1.1 Ubuntu 14.04 LTS: file 1:5.14-2ubuntu3.4 libmagic1 1:5.14-2ubuntu3.4 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3686-1 CVE-2014-9620, CVE-2014-9621, CVE-2014-9653, CVE-2015-8865, CVE-2018-10360 Package Information: https://launchpad.net/ubuntu/+source/file/1:5.32-2ubuntu0.1 https://launchpad.net/ubuntu/+source/file/1:5.32-1ubuntu0.1 https://launchpad.net/ubuntu/+source/file/1:5.25-2ubuntu1.1 https://launchpad.net/ubuntu/+source/file/1:5.14-2ubuntu3.4

Trust: 2.61

sources: NVD: CVE-2015-8865 // JVNDB: JVNDB-2015-007175 // BID: 85802 // VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // PACKETSTORM: 148367 // PACKETSTORM: 137086 // PACKETSTORM: 136841 // PACKETSTORM: 140540 // PACKETSTORM: 139968 // PACKETSTORM: 148192

AFFECTED PRODUCTS

vendor:phpmodel:phpscope:eqversion:7.0.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.19

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.18

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.17

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.13

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.12

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.11

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.5

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.4

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.4

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:7.0.1

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.9

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.8

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.7

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.6

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.3

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.2

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.14

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.10

Trust: 1.3

vendor:phpmodel:phpscope:eqversion:5.6.16

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.11.4

Trust: 1.0

vendor:phpmodel:phpscope:lteversion:5.5.33

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.6.15

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:5.6.0

Trust: 1.0

vendor:phpmodel:phpscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11 and later

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:7.0.5

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:5.6.x

Trust: 0.8

vendor:the php groupmodel:phpscope:ltversion:7.x

Trust: 0.8

vendor:the php groupmodel:phpscope:eqversion:5.6.20

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.11.4

Trust: 0.6

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:15.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:7.0

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.33

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.32

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.45

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.44

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.43

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.37

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.30

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.29

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.20

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.0.1

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.6

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.8

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.7

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.31

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.30

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.17

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.5.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.9

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.5

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.42

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.41

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.39

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.38

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.36

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.35

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.34

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.33

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.32

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.31

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.28

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.24

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.23

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.22

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.21

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.20

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.16

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.13

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.12

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.4.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.4

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.3

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.27

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.26

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.25

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.19

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.18

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.15

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.11

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.3.10

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.17.03

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2.14

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.2

Trust: 0.3

vendor:phpmodel:phpscope:eqversion:5.1.43

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os security updatescope:eqversion:x2016-0020

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:phpmodel:phpscope:neversion:7.0.5

Trust: 0.3

vendor:phpmodel:phpscope:neversion:5.6.20

Trust: 0.3

vendor:phpmodel:phpscope:neversion:5.5.34

Trust: 0.3

vendor:applemodel:mac os security updatescope:neversion:x2016-0030

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.11.5

Trust: 0.3

sources: BID: 85802 // CNNVD: CNNVD-201604-556 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-8865
value: HIGH

Trust: 1.0

NVD: CVE-2015-8865
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201604-556
value: HIGH

Trust: 0.6

VULHUB: VHN-86826
value: HIGH

Trust: 0.1

VULMON: CVE-2015-8865
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-8865
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-86826
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-8865
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // CNNVD: CNNVD-201604-556 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-86826 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 140540 // CNNVD: CNNVD-201604-556

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201604-556

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007175

PATCH

title:APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003url:http://lists.apple.com/archives/security-announce/2016/May/msg00004.html

Trust: 0.8

title:HT206567url:https://support.apple.com/en-us/HT206567

Trust: 0.8

title:HT206567url:https://support.apple.com/ja-jp/HT206567

Trust: 0.8

title:PR/454: Fix memory corruption when the continuation level jumps by more thanurl:https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36

Trust: 0.8

title:0000522: Buffer over-write in PHP function finfo_open with malformed magic file. (uses libmagic)url:http://bugs.gw.com/view.php?id=522

Trust: 0.8

title:Sec Bug #71527url:https://bugs.php.net/bug.php?id=71527

Trust: 0.8

title:PHP 5 ChangeLogurl:http://php.net/ChangeLog-5.php

Trust: 0.8

title:PHP 7 ChangeLogurl:http://php.net/ChangeLog-7.php

Trust: 0.8

title:Fixed bug #71527 Buffer over-write in finfo_open with malformed magic fileurl:http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 0.8

title:PHP Fileinfo Fixes for component buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61239

Trust: 0.6

title:Debian CVElist Bug Report Logs: file: CVE-2015-8865: file_check_mem() misbehaves on some inputurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=357578556d837956c999174963fd2eea

Trust: 0.1

title:Ubuntu Security Notice: file vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3686-2

Trust: 0.1

title:Red Hat: CVE-2015-8865url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-8865

Trust: 0.1

title:Ubuntu Security Notice: file vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3686-1

Trust: 0.1

title:Debian Security Advisories: DSA-3560-1 php5 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9f33dfec360e1186a6d0f52314de3ce6

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-698url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-698

Trust: 0.1

title:Ubuntu Security Notice: php5, php7.0 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2984-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: hhvm: Various CVEs (CVE-2014-9709 CVE-2015-8865 CVE-2016-1903 CVE-2016-4070 CVE-2016-4539 CVE-2016-6870 CVE-2016-6871 CVE-2016-6872 CVE-2016-6873 CVE-2016-6874 CVE-2016-6875)url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=98d16dc1a3e1824eeb9ad5c28e1a0a02

Trust: 0.1

title:Red Hat: Moderate: rh-php56 security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162750 - Security Advisory

Trust: 0.1

title:Apple: OS X El Capitan v10.11.5 and Security Update 2016-003url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=3c550201b398ce302f3a9adf27215fda

Trust: 0.1

sources: VULMON: CVE-2015-8865 // CNNVD: CNNVD-201604-556 // JVNDB: JVNDB-2015-007175

EXTERNAL IDS

db:NVDid:CVE-2015-8865

Trust: 3.5

db:OPENWALLid:OSS-SECURITY/2016/04/24/1

Trust: 1.8

db:BIDid:85802

Trust: 1.5

db:JVNDBid:JVNDB-2015-007175

Trust: 0.8

db:CNNVDid:CNNVD-201604-556

Trust: 0.7

db:PACKETSTORMid:148367

Trust: 0.2

db:PACKETSTORMid:139968

Trust: 0.2

db:PACKETSTORMid:136841

Trust: 0.2

db:PACKETSTORMid:137086

Trust: 0.2

db:PACKETSTORMid:137174

Trust: 0.1

db:VULHUBid:VHN-86826

Trust: 0.1

db:VULMONid:CVE-2015-8865

Trust: 0.1

db:PACKETSTORMid:140540

Trust: 0.1

db:PACKETSTORMid:148192

Trust: 0.1

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // BID: 85802 // PACKETSTORM: 148367 // PACKETSTORM: 137086 // PACKETSTORM: 136841 // PACKETSTORM: 140540 // PACKETSTORM: 139968 // PACKETSTORM: 148192 // CNNVD: CNNVD-201604-556 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

REFERENCES

url:https://bugs.php.net/bug.php?id=71527

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2016/may/msg00004.html

Trust: 1.8

url:http://bugs.gw.com/view.php?id=522

Trust: 1.8

url:http://www.php.net/changelog-5.php

Trust: 1.8

url:http://www.php.net/changelog-7.php

Trust: 1.8

url:https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36

Trust: 1.8

url:https://support.apple.com/ht206567

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2016/04/24/1

Trust: 1.8

url:https://security.gentoo.org/glsa/201611-22

Trust: 1.3

url:https://security.gentoo.org/glsa/201701-42

Trust: 1.3

url:https://usn.ubuntu.com/3686-2/

Trust: 1.3

url:http://www.securityfocus.com/bid/85802

Trust: 1.2

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05240731

Trust: 1.2

url:http://www.debian.org/security/2016/dsa-3560

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2016-2750.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2952-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2952-2

Trust: 1.2

url:https://usn.ubuntu.com/3686-1/

Trust: 1.2

url:http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 1.1

url:http://git.php.net/?p=php-src.git%3ba=commit%3bh=fe13566c93f118a15a96320a546c7878fd0cfc5e

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8865

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8865

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-8865

Trust: 0.6

url:http://php.net/changelog-5.php

Trust: 0.3

url:http://php.net/changelog-7.php

Trust: 0.3

url:http://www.php.net/

Trust: 0.3

url:https://usn.ubuntu.com/usn/usn-3686-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-10360

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4073

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4072

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4071

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8865

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-9653

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-osx-apachemodphp-cve-2015-8865

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827377

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3686-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1795

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1799

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1814

Trust: 0.1

url:http://www.knownsec.com]

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1798

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1804

Trust: 0.1

url:https://www.linkedin.com/in/rshupak)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1793

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1800

Trust: 0.1

url:https://support.apple.com/en-us/ht206565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1794

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1810

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1813

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1796

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1812

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1792

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1809

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://php.net/changelog-5.php#5.6.20

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3710

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9653

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3710

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7131

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7417

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7129

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4538

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7132

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4538

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4542

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6292

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7416

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5385

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6295

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5385

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7134

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7411

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4537

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7413

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6292

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7414

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4543

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6295

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6294

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4543

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7129

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7412

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7418

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3074

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/file/1:5.25-2ubuntu1.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9621

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/file/1:5.14-2ubuntu3.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/file/1:5.32-2ubuntu0.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9620

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/file/1:5.32-1ubuntu0.1

Trust: 0.1

sources: VULHUB: VHN-86826 // VULMON: CVE-2015-8865 // BID: 85802 // PACKETSTORM: 148367 // PACKETSTORM: 137086 // PACKETSTORM: 136841 // PACKETSTORM: 140540 // PACKETSTORM: 139968 // PACKETSTORM: 148192 // CNNVD: CNNVD-201604-556 // JVNDB: JVNDB-2015-007175 // NVD: CVE-2015-8865

CREDITS

Hugh Davenport

Trust: 0.3

sources: BID: 85802

SOURCES

db:VULHUBid:VHN-86826
db:VULMONid:CVE-2015-8865
db:BIDid:85802
db:PACKETSTORMid:148367
db:PACKETSTORMid:137086
db:PACKETSTORMid:136841
db:PACKETSTORMid:140540
db:PACKETSTORMid:139968
db:PACKETSTORMid:148192
db:CNNVDid:CNNVD-201604-556
db:JVNDBid:JVNDB-2015-007175
db:NVDid:CVE-2015-8865

LAST UPDATE DATE

2026-02-06T20:00:40.957000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-86826date:2018-06-30T00:00:00
db:VULMONid:CVE-2015-8865date:2018-06-30T00:00:00
db:BIDid:85802date:2017-01-23T09:11:00
db:CNNVDid:CNNVD-201604-556date:2016-05-23T00:00:00
db:JVNDBid:JVNDB-2015-007175date:2016-05-25T00:00:00
db:NVDid:CVE-2015-8865date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-86826date:2016-05-20T00:00:00
db:VULMONid:CVE-2015-8865date:2016-05-20T00:00:00
db:BIDid:85802date:2016-04-02T00:00:00
db:PACKETSTORMid:148367date:2018-06-29T00:19:16
db:PACKETSTORMid:137086date:2016-05-17T16:06:24
db:PACKETSTORMid:136841date:2016-04-28T15:45:53
db:PACKETSTORMid:140540date:2017-01-17T15:34:19
db:PACKETSTORMid:139968date:2016-12-01T16:38:01
db:PACKETSTORMid:148192date:2018-06-14T15:57:22
db:CNNVDid:CNNVD-201604-556date:2016-04-25T00:00:00
db:JVNDBid:JVNDB-2015-007175date:2016-05-25T00:00:00
db:NVDid:CVE-2015-8865date:2016-05-20T10:59:00.137