VARIoT IoT vulnerabilities database
| VAR-201603-0159 | CVE-2015-6260 | plural Cisco Nexus Run on device Cisco NX-OS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 devices does not properly validate PDUs in SNMP packets, which allows remote attackers to cause a denial of service (SNMP application restart) via a crafted packet, aka Bug ID CSCut84645. Cisco NX-OS is a data center level operating system
| VAR-201603-0036 | CVE-2016-1288 | Cisco Web Security Runs on the appliance device AsyncOS of HTTPS Service operation interruption in proxy function (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The HTTPS Proxy feature in Cisco AsyncOS before 8.5.3-051 and 9.x before 9.0.0-485 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (service outage) by leveraging certain intranet connectivity and sending a malformed HTTPS request, aka Bug ID CSCuu24840. Cisco AsyncOS on Web Security Appliance (WSA) is a set of operating systems run on Web Security Appliance (WSA) by Cisco. A security vulnerability exists in the Web proxy framework of Cisco WSA running Cisco AsyncOS versions prior to 8.5.3-051 and versions prior to 9.0.0-485. The vulnerability is due to the program not properly handling HTTPS packets. A remote attacker could exploit this vulnerability to cause a denial of service (packet loss)
| VAR-201603-0285 | CVE-2016-1356 | Cisco FireSIGHT system Vulnerabilities that enumerate valid user names in software |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
Cisco FireSIGHT System Software 6.1.0 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to enumerate valid usernames by measuring timing differences, aka Bug ID CSCuy41615. Cisco FireSIGHT system The software uses a fixed amount of time ( constant-time ) There is a vulnerability that enumerates valid user names because no algorithm is used. Cisco FireSIGHT System Software is a set of management center software of Cisco (Cisco), which supports centralized management of the network security and operation functions of Cisco ASA and Cisco FirePOWER network security devices using FirePOWER Services
| VAR-201603-0287 | CVE-2016-1358 | Cisco Prime Infrastructure Vulnerable to reading arbitrary files |
CVSS V2: 5.5 CVSS V3: 6.4 Severity: MEDIUM |
Cisco Prime Infrastructure 2.2, 3.0, and 3.1(0.0) allows remote authenticated users to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCuw81497. Cisco Prime Infrastructure Any file can be read or service disruption (DoS) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCuw81497 It is released as. Cisco Prime Infrastructure (PI) is a set of Cisco (Cisco) wireless management solutions through Cisco Prime LAN Management Solution (LMS) and Cisco Prime Network Control System (NCS) technology. A security vulnerability exists in Cisco PI. The following releases are affected: Cisco PI Release 2.2, Release 3.0, Release 3.1(0.0)
| VAR-201603-0288 | CVE-2016-1359 | Cisco Prime Infrastructure Vulnerable to arbitrary code execution |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Cisco Prime Infrastructure 3.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP request that is mishandled during viewing of a log file, aka Bug ID CSCuw81494. Cisco Prime Infrastructure Contains a vulnerability that allows arbitrary code execution. Cisco Prime Infrastructure (PI) is a set of Cisco (Cisco) wireless management solutions through Cisco Prime LAN Management Solution (LMS) and Cisco Prime Network Control System (NCS) technology. A security vulnerability exists in Cisco PI version 3.0 due to the program not properly validating input when referencing system log files
| VAR-201603-0283 | CVE-2016-1354 | Cisco Unified Communications Domain Manager Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Unified Communications Domain Manager (UCDM) 8.x before 8.1.1 allows remote attackers to inject arbitrary web script or HTML via crafted markup data, aka Bug ID CSCud41176. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
| VAR-201603-0284 | CVE-2016-1355 | Cisco FireSIGHT system Cross-site scripting vulnerability in software management interface |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the Device Management UI in the management interface in Cisco FireSIGHT System Software 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCuy41687. Cisco FireSIGHT System Software is a set of management center software of Cisco (Cisco), which supports centralized management of the network security and operation functions of Cisco ASA and Cisco FirePOWER network security devices using FirePOWER Services
| VAR-201701-0620 | CVE-2014-8362 | Vivint SkyControl Panel Enable alarm system in / Disabled vulnerabilities |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Vivint Sky Control Panel 1.1.1.9926 allows remote attackers to enable and disable the alarm system and modify other security settings via the Web-enabled interface. Vivint SkyControl Panel is a control panel interface for centralized management of smart home from Vivint Company in the United States. Vivint SkyControl Panel version 1.1.1.9926 has a security vulnerability. Vivint Sky Control Panel Unauthenticated Access Vulnerability
Solutionary ID: SERT-VDN-1017
Risk Rating: High
CVE ID: CVE-2014-8362
Product: Vivint Sky Control Panel
Application Vendor: Vivint
Vendor URL: http://www.vivint.com/en/
Date discovered: 09/25/2014
Discovered by: Jeremy Scott and Solutionary Security Engineering Research Team (SERT)
Vendor notification date: 10/17/2014
Vendor response date: No Response
Vendor acknowledgment date: No Response
Public disclosure date: 09/22/2015
Type of vulnerability: Unauthenticated Administrative Access
Exploit Vectors: Local and Remote
Vulnerability Description: Vivint Sky Control Panel contains a flaw allowing unauthenticated access through a Web-enabled interface (default port 8090) to the Vivint Sky application.
Fixed in: Current version
Remediation guidelines: The vendor has implemented authentication to require authentication to the Web interface. Please contact the vendor and request a firmware update to mitigate the vulnerability, if identified
| VAR-201603-0104 | CVE-2016-1158 | Multiple Corega wireless LAN routers vulnerable to cross-site request forgery |
CVSS V2: 5.1 CVSS V3: 8.8 Severity: HIGH |
Cross-site request forgery (CSRF) vulnerability on Corega CG-WLBARGMH and CG-WLBARGNL devices allows remote attackers to hijack the authentication of administrators for requests that perform administrative functions. Multiple wireless LAN routers provided by Corega Inc contain a cross-site request forgery vulnerability (CWE-352). Yutaka Kokubu and Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. and Ueki Shuya reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged into the management screen, various administrative functions may be performed. CoregaCG-WLBARGMH and CG-WLBARGNL are wireless router products from Japan's Corega. An attacker could exploit the vulnerability to perform an administrator action with a malicious page
| VAR-201603-0044 | CVE-2016-2279 | Rockwell Automation Allen-Bradley CompactLogix Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley CompactLogix 1769-L* before 28.011+ allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Rockwell Automation Allen-Bradley CompactLogix is a Web-based SCADA system from Rockwell Automation. The 1769-L16ER-BB1B and the like are all controllers used therein. 1769-L16ER-BB1B etc. are used in the controller
| VAR-201603-0043 | CVE-2016-2278 | Schneider Electric Building Operation Application Server Operating system command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.7 and earlier allows remote authenticated administrators to execute arbitrary OS commands by defeating an msh (aka Minimal Shell) protection mechanism. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. A remote attacker can exploit this vulnerability to bypass access control and execute arbitrary OS commands. Weak credential management*
*CVE-ID:* None *[ Mitre, CVE? ]*
There are two primary users:
a. root - password is not set by default - this is a problem as we will see
later in the vuln findings
- By default, root cannot SSH in.
b. admin - default password is 'admin'
- Anyone can remotely ssh in to the device using default admin/admin login.
The system / application allows a) weak creds to start with, and more
importantly, b) vulnerable versions lacks the mechanism to forcefully have
the user change the initial password on first use or later. This has been
fixed in the latest version.
*2. OS Command Injection*
After logging in to the device over SSH, the 'admin' user - the only
active, administrative user at this point - is provided a restricted shell
(msh), which offers a small set of, application- specific functional
options.
$ ssh <IP> -l admin Password:
Welcome! (use 'help' to list commands) admin@box:>
admin@box:> release
NAME=SE2Linux
ID=se2linux
PRETTY_NAME=SE2Linux (Schneider Electric Embedded Linux)
VERSION_ID=0.2.0.212
admin@box:>
admin@box:> help
usage: help [command]
Type 'help [command]' for help on a specific command.
Available commands:
exit - exit this session
ps - report a snapshot of the current processes readlog - read log files
reboot - reboot the system
setip - configure the network interface
setlog - configure the logging
setsnmp - configure the snmp service
setsecurity - configure the security
settime - configure the system time
top - display Linux tasks
uptime - tell how long the system has been running release - tell the os
release details
Attempting to run any different command will give an error message.
However, this restricted shell functionality (msh) can be bypassed to
execute underlying system commands, by appending '| <command>' to any of
the above set of commands:
admin@box:> uptime | ls
bin home lost+found root sys config include mnt run tmp dev lib opt sbin usr
etc localization proc share var
admin@box:> uptime | cat /etc/passwd
root:x:0:0:root:/:/bin/sh daemon:x:2:2:daemon:/sbin:/bin/false
messagebus:x:3:3:messagebus:/sbin:/bin/false
ntp:x:102:102:ntp:/var/empty/ntp:/bin/false
sshd:x:103:103:sshd:/var/empty:/bin/false app:x:500:500:Linux
Application:/:/bin/false admin:x:1000:1000:Linux User,,,:/:/bin/msh
admin@box:> uptime | cat /etc/group root:x:0:
wheel:x:1:admin
daemon:x:2:
messagebus:x:3:
adm:x:5:admin
power:x:20:app
serial:x:21:app
cio:x:22:app
lon:x:23:app
daemonsv:x:30:admin,app
utmp:x:100:
lock:x:101:
ntp:x:102:
sshd:x:103:
app:x:500:admin
admin:x:1000:admin
*3. Privilege Escalation / access to root*
*CVE-ID:* None *[ Mitre, CVE? ]*
Since this is an administrative user, an attacker can exploit OS command
injection to perform a variety of tasks from msh shell. But isn’t it better
to get a root shell instead.!
As observed from Issue 1 above, root does not have a password set, and it
is possible to use 'sudo -i' and become root.
Note: sudo is not presented / offered to 'admin' in the set of functional
options available thru msh.
admin@box:> *sudo -i*
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
Password:
*root@box:~> *cat /etc/shadow
root:!:16650:0:99999:7:::
sshd:!:1:0:99999:7:::
admin:$6$<hash>:16652:0:99999:7:::
+++++
The Automation Server (AS) is one functional component of the larger,
StruxureWare Building Operation platform (SBO) solution / environment. The
AS password gets sync’d to SBO application rbac. With the new release, the
default AS password will be forcefully changed, and msh has been
sufficiently improved to mitigate against command injection.
Issue 3, however, persists. Anyone with access to msh shell, can still drop
in to root shell, and have some fun.
+++++
--
Best Regards,
Karn Ganeshen
| VAR-201605-0117 | CVE-2016-4071 | PHP of ext/snmp/snmp.c of php_snmp_error Format string vulnerability in functions |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call. PHP is prone to a remote format-string vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following versions are affected: PHP prior to 5.5.34, 5.6.x prior to 5.6.20, and 7.x prior to 7.0.5. ============================================================================
Ubuntu Security Notice USN-2984-1
May 24, 2016
php5, php7.0 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in PHP. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865)
Hans Jerry Illikainen discovered that the PHP Zip extension incorrectly
handled certain malformed Zip archives. This issue only affected Ubuntu 16.04 LTS.
(CVE-2016-3078)
It was discovered that PHP incorrectly handled invalid indexes in the
SplDoublyLinkedList class. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132)
It was discovered that the PHP rawurlencode() function incorrectly handled
large strings. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
16.04 LTS. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071)
It was discovered that the PHP phar extension incorrectly handled certain
filenames in archives. This issue only affected Ubuntu 16.04 LTS. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073)
It was discovered that the PHP phar extension incorrectly handled certain
archive files. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and
Ubuntu 15.10. (CVE-2016-4342, CVE-2016-4343)
It was discovered that the PHP bcpowmod() function incorrectly handled
memory.
(CVE-2016-4537, CVE-2016-4538)
It was discovered that the PHP XML parser incorrectly handled certain
malformed XML data. (CVE-2016-4539)
It was discovered that certain PHP grapheme functions incorrectly handled
negative offsets. (CVE-2016-4540,
CVE-2016-4541)
It was discovered that PHP incorrectly handled certain malformed EXIF tags. (CVE-2016-4542, CVE-2016-4543,
CVE-2016-4544)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.4-7ubuntu2.1
php7.0-cgi 7.0.4-7ubuntu2.1
php7.0-cli 7.0.4-7ubuntu2.1
php7.0-fpm 7.0.4-7ubuntu2.1
Ubuntu 15.10:
libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.4
php5-cgi 5.6.11+dfsg-1ubuntu3.4
php5-cli 5.6.11+dfsg-1ubuntu3.4
php5-fpm 5.6.11+dfsg-1ubuntu3.4
Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.17
php5-cgi 5.5.9+dfsg-1ubuntu4.17
php5-cli 5.5.9+dfsg-1ubuntu4.17
php5-fpm 5.5.9+dfsg-1ubuntu4.17
Ubuntu 12.04 LTS:
libapache2-mod-php5 5.3.10-1ubuntu3.23
php5-cgi 5.3.10-1ubuntu3.23
php5-cli 5.3.10-1ubuntu3.23
php5-fpm 5.3.10-1ubuntu3.23
In general, a standard system update will make all the necessary changes.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-php56 security, bug fix, and enhancement update
Advisory ID: RHSA-2016:2750-01
Product: Red Hat Software Collections
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2750.html
Issue date: 2016-11-15
CVE Names: CVE-2013-7456 CVE-2014-9767 CVE-2015-2325
CVE-2015-2326 CVE-2015-2327 CVE-2015-2328
CVE-2015-3210 CVE-2015-3217 CVE-2015-5073
CVE-2015-8381 CVE-2015-8383 CVE-2015-8384
CVE-2015-8385 CVE-2015-8386 CVE-2015-8388
CVE-2015-8391 CVE-2015-8392 CVE-2015-8395
CVE-2015-8835 CVE-2015-8865 CVE-2015-8866
CVE-2015-8867 CVE-2015-8873 CVE-2015-8874
CVE-2015-8876 CVE-2015-8877 CVE-2015-8879
CVE-2016-1903 CVE-2016-2554 CVE-2016-3074
CVE-2016-3141 CVE-2016-3142 CVE-2016-4070
CVE-2016-4071 CVE-2016-4072 CVE-2016-4073
CVE-2016-4342 CVE-2016-4343 CVE-2016-4473
CVE-2016-4537 CVE-2016-4538 CVE-2016-4539
CVE-2016-4540 CVE-2016-4541 CVE-2016-4542
CVE-2016-4543 CVE-2016-4544 CVE-2016-5093
CVE-2016-5094 CVE-2016-5096 CVE-2016-5114
CVE-2016-5399 CVE-2016-5766 CVE-2016-5767
CVE-2016-5768 CVE-2016-5770 CVE-2016-5771
CVE-2016-5772 CVE-2016-5773 CVE-2016-6128
CVE-2016-6207 CVE-2016-6288 CVE-2016-6289
CVE-2016-6290 CVE-2016-6291 CVE-2016-6292
CVE-2016-6294 CVE-2016-6295 CVE-2016-6296
CVE-2016-6297 CVE-2016-7124 CVE-2016-7125
CVE-2016-7126 CVE-2016-7127 CVE-2016-7128
CVE-2016-7129 CVE-2016-7130 CVE-2016-7131
CVE-2016-7132
=====================================================================
1. Summary:
An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now
available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server. The rh-php56 packages provide a recent stable release of PHP
with PEAR 1.9.5 and enhanced language features including constant
expressions, variadic functions, arguments unpacking, and the interactive
debuger. The memcache, mongo, and XDebug extensions are also included.
The rh-php56 Software Collection has been upgraded to version 5.6.25, which
provides a number of bug fixes and enhancements over the previous version.
(BZ#1356157, BZ#1365401)
Security Fixes in the rh-php56-php component:
* Several Moderate and Low impact security issues were found in PHP. Under
certain circumstances, these issues could cause PHP to crash, disclose
portions of its memory, execute arbitrary code, or impact PHP application
integrity. Space precludes documenting each of these issues in this
advisory. Refer to the CVE links in the References section for a
description of each of these vulnerabilities. (CVE-2013-7456,
CVE-2014-9767, CVE-2015-8835, CVE-2015-8865, CVE-2015-8866, CVE-2015-8867,
CVE-2015-8873, CVE-2015-8874, CVE-2015-8876, CVE-2015-8877, CVE-2015-8879,
CVE-2016-1903, CVE-2016-2554, CVE-2016-3074, CVE-2016-3141, CVE-2016-3142,
CVE-2016-4070, CVE-2016-4071, CVE-2016-4072, CVE-2016-4073, CVE-2016-4342,
CVE-2016-4343, CVE-2016-4473, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539,
CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543, CVE-2016-4544,
CVE-2016-5093, CVE-2016-5094, CVE-2016-5096, CVE-2016-5114, CVE-2016-5399,
CVE-2016-5766, CVE-2016-5767, CVE-2016-5768, CVE-2016-5770, CVE-2016-5771,
CVE-2016-5772, CVE-2016-5773, CVE-2016-6128, CVE-2016-6207, CVE-2016-6288,
CVE-2016-6289, CVE-2016-6290, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294,
CVE-2016-6295, CVE-2016-6296, CVE-2016-6297, CVE-2016-7124, CVE-2016-7125,
CVE-2016-7126, CVE-2016-7127, CVE-2016-7128, CVE-2016-7129, CVE-2016-7130,
CVE-2016-7131, CVE-2016-7132)
* Multiple flaws were found in the PCRE library included with the
rh-php56-php packages for Red Hat Enterprise Linux 6. A specially crafted
regular expression could cause PHP to crash or, possibly, execute arbitrary
code. (CVE-2015-2325, CVE-2015-2326, CVE-2015-2327, CVE-2015-2328,
CVE-2015-3210, CVE-2015-3217, CVE-2015-5073, CVE-2015-8381, CVE-2015-8383,
CVE-2015-8384, CVE-2015-8385, CVE-2015-8386, CVE-2015-8388, CVE-2015-8391,
CVE-2015-8392, CVE-2015-8395)
Red Hat would like to thank Hans Jerry Illikainen for reporting
CVE-2016-3074, CVE-2016-4473, and CVE-2016-5399.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted
for the update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1207198 - CVE-2015-2325 pcre: heap buffer overflow in compile_branch()
1207202 - CVE-2015-2326 pcre: heap buffer over-read in pcre_compile2() (8.37/23)
1228283 - CVE-2015-3217 pcre: stack overflow caused by mishandled group empty match (8.38/11)
1237223 - CVE-2015-5073 CVE-2015-8388 pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18)
1260716 - CVE-2014-9767 php: ZipArchive::extractTo allows for directory traversal when creating directories
1285399 - CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)
1285408 - CVE-2015-2327 pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19)
1287614 - CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group (8.38/3)
1287623 - CVE-2015-3210 CVE-2015-8384 pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4)
1287629 - CVE-2015-8385 pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30)
1287636 - CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)
1287671 - CVE-2015-8391 pcre: inefficient posix character class syntax check (8.38/16)
1287690 - CVE-2015-8392 pcre: buffer overflow caused by patterns with duplicated named groups with (?| (8.38/27)
1287711 - CVE-2015-8381 CVE-2015-8395 pcre: Buffer overflow caused by duplicate named references (8.38/36)
1297710 - CVE-2016-5114 php: out-of-bounds write in fpm_log.c
1297717 - CVE-2016-1903 php: Out-of-bounds memory read via gdImageRotateInterpolated
1305536 - CVE-2016-4342 php: use of uninitialized pointer in PharFileInfo::getContent
1305543 - CVE-2016-2554 php: buffer overflow in handling of long link names in tar phar archives
1315312 - CVE-2016-3142 php: Out-of-bounds read in phar_parse_zipfile()
1315328 - CVE-2016-3141 php: Use after free in WDDX Deserialize when processing XML data
1321893 - CVE-2016-3074 php: Signedness vulnerability causing heap overflow in libgd
1323074 - CVE-2015-8835 php: type confusion issue in Soap Client call() method
1323103 - CVE-2016-4073 php: Negative size parameter in memcpy
1323106 - CVE-2016-4072 php: Invalid memory write in phar on filename containing \0 inside name
1323108 - CVE-2016-4071 php: Format string vulnerability in php_snmp_error()
1323114 - CVE-2016-4070 php: Integer overflow in php_raw_url_encode
1323118 - CVE-2015-8865 file: Buffer over-write in finfo_open with malformed magic file
1330418 - CVE-2015-8866 php: libxml_disable_entity_loader setting is shared between threads
1330420 - CVE-2015-8867 php: openssl_random_pseudo_bytes() is not cryptographically secure
1332454 - CVE-2016-4343 php: Uninitialized pointer in phar_make_dirstream()
1332860 - CVE-2016-4537 CVE-2016-4538 php: bcpowmod accepts negative scale causing heap buffer overflow corrupting _one_ definition
1332865 - CVE-2016-4542 CVE-2016-4543 CVE-2016-4544 php: Out-of-bounds heap memory read in exif_read_data() caused by malformed input
1332872 - CVE-2016-4540 CVE-2016-4541 php: OOB read in grapheme_stripos and grapheme_strpos when negative offset is used
1332877 - CVE-2016-4539 php: xml_parse_into_struct() can crash when XML parser is re-used
1336772 - CVE-2015-8874 gd: gdImageFillToBorder deep recursion leading to stack overflow
1336775 - CVE-2015-8873 php: Stack consumption vulnerability in Zend/zend_exceptions.c
1338896 - CVE-2015-8876 php: Zend/zend_exceptions.c does not validate certain Exception objects
1338907 - CVE-2015-8877 gd: gdImageScaleTwoPass function in gd_interpolation.c uses inconsistent allocate and free approaches
1338912 - CVE-2015-8879 php: odbc_bindcols function mishandles driver behavior for SQL_WVARCHAR columns
1339590 - CVE-2016-5093 php: improper nul termination leading to out-of-bounds read in get_icu_value_internal
1339949 - CVE-2016-5096 php: Integer underflow causing arbitrary null write in fread/gzread
1340433 - CVE-2013-7456 gd: incorrect boundary adjustment in _gdContributionsCalc
1340738 - CVE-2016-5094 php: Integer overflow in php_html_entities()
1347772 - CVE-2016-4473 php: Invalid free() instead of efree() in phar_extract_file()
1351068 - CVE-2016-5766 gd: Integer Overflow in _gd2GetHeader() resulting in heap overflow
1351069 - CVE-2016-5767 gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow
1351168 - CVE-2016-5768 php: Double free in _php_mb_regex_ereg_replace_exec
1351171 - CVE-2016-5770 php: Int/size_t confusion in SplFileObject::fread
1351173 - CVE-2016-5771 php: Use After Free Vulnerability in PHP's GC algorithm and unserialize
1351175 - CVE-2016-5772 php: Double Free Corruption in wddx_deserialize
1351179 - CVE-2016-5773 php: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize
1351603 - CVE-2016-6128 gd: Invalid color index not properly handled
1358395 - CVE-2016-5399 php: Improper error handling in bzread()
1359698 - CVE-2016-6289 php: Integer overflow leads to buffer overflow in virtual_file_ex
1359710 - CVE-2016-6290 php: Use after free in unserialize() with Unexpected Session Deserialization
1359718 - CVE-2016-6291 php: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE
1359756 - CVE-2016-6292 php: Null pointer dereference in exif_process_user_comment
1359800 - CVE-2016-6207 php,gd: Integer overflow error within _gdContributionsAlloc()
1359811 - CVE-2016-6294 php: Out-of-bounds access in locale_accept_from_http
1359815 - CVE-2016-6295 php: Use after free in SNMP with GC and unserialize()
1359822 - CVE-2016-6296 php: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c
1359828 - CVE-2016-6297 php: Stack-based buffer overflow vulnerability in php_stream_zip_opener
1360322 - CVE-2016-6288 php: Buffer over-read in php_url_parse_ex
1374697 - CVE-2016-7124 php: bypass __wakeup() in deserialization of an unexpected object
1374698 - CVE-2016-7125 php: Session Data Injection Vulnerability
1374699 - CVE-2016-7126 php: select_colors write out-of-bounds
1374701 - CVE-2016-7127 php: imagegammacorrect allows arbitrary write access
1374704 - CVE-2016-7128 php: Memory Leakage In exif_process_IFD_in_TIFF
1374705 - CVE-2016-7129 php: wddx_deserialize allows illegal memory access
1374707 - CVE-2016-7130 php: wddx_deserialize null dereference
1374708 - CVE-2016-7131 php: wddx_deserialize null dereference with invalid xml
1374711 - CVE-2016-7132 php: wddx_deserialize null dereference in php_wddx_pop_element
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-php56-2.3-1.el6.src.rpm
rh-php56-php-5.6.25-1.el6.src.rpm
rh-php56-php-pear-1.9.5-4.el6.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el6.noarch.rpm
x86_64:
rh-php56-2.3-1.el6.x86_64.rpm
rh-php56-php-5.6.25-1.el6.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm
rh-php56-php-common-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm
rh-php56-php-process-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm
rh-php56-runtime-2.3-1.el6.x86_64.rpm
rh-php56-scldevel-2.3-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
rh-php56-2.3-1.el6.src.rpm
rh-php56-php-5.6.25-1.el6.src.rpm
rh-php56-php-pear-1.9.5-4.el6.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el6.noarch.rpm
x86_64:
rh-php56-2.3-1.el6.x86_64.rpm
rh-php56-php-5.6.25-1.el6.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm
rh-php56-php-common-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm
rh-php56-php-process-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm
rh-php56-runtime-2.3-1.el6.x86_64.rpm
rh-php56-scldevel-2.3-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-php56-2.3-1.el6.src.rpm
rh-php56-php-5.6.25-1.el6.src.rpm
rh-php56-php-pear-1.9.5-4.el6.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el6.noarch.rpm
x86_64:
rh-php56-2.3-1.el6.x86_64.rpm
rh-php56-php-5.6.25-1.el6.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el6.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el6.x86_64.rpm
rh-php56-php-common-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el6.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el6.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el6.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el6.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el6.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-imap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el6.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el6.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el6.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el6.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el6.x86_64.rpm
rh-php56-php-process-5.6.25-1.el6.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el6.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el6.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el6.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el6.x86_64.rpm
rh-php56-php-tidy-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el6.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el6.x86_64.rpm
rh-php56-runtime-2.3-1.el6.x86_64.rpm
rh-php56-scldevel-2.3-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-php56-2.3-1.el7.src.rpm
rh-php56-php-5.6.25-1.el7.src.rpm
rh-php56-php-pear-1.9.5-4.el7.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el7.noarch.rpm
x86_64:
rh-php56-2.3-1.el7.x86_64.rpm
rh-php56-php-5.6.25-1.el7.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm
rh-php56-php-common-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm
rh-php56-php-process-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm
rh-php56-runtime-2.3-1.el7.x86_64.rpm
rh-php56-scldevel-2.3-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):
Source:
rh-php56-2.3-1.el7.src.rpm
rh-php56-php-5.6.25-1.el7.src.rpm
rh-php56-php-pear-1.9.5-4.el7.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el7.noarch.rpm
x86_64:
rh-php56-2.3-1.el7.x86_64.rpm
rh-php56-php-5.6.25-1.el7.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm
rh-php56-php-common-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm
rh-php56-php-process-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm
rh-php56-runtime-2.3-1.el7.x86_64.rpm
rh-php56-scldevel-2.3-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):
Source:
rh-php56-2.3-1.el7.src.rpm
rh-php56-php-5.6.25-1.el7.src.rpm
rh-php56-php-pear-1.9.5-4.el7.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el7.noarch.rpm
x86_64:
rh-php56-2.3-1.el7.x86_64.rpm
rh-php56-php-5.6.25-1.el7.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm
rh-php56-php-common-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm
rh-php56-php-process-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm
rh-php56-runtime-2.3-1.el7.x86_64.rpm
rh-php56-scldevel-2.3-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-php56-2.3-1.el7.src.rpm
rh-php56-php-5.6.25-1.el7.src.rpm
rh-php56-php-pear-1.9.5-4.el7.src.rpm
noarch:
rh-php56-php-pear-1.9.5-4.el7.noarch.rpm
x86_64:
rh-php56-2.3-1.el7.x86_64.rpm
rh-php56-php-5.6.25-1.el7.x86_64.rpm
rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm
rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm
rh-php56-php-common-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm
rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm
rh-php56-php-debuginfo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm
rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm
rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm
rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm
rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm
rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm
rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm
rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm
rh-php56-php-process-5.6.25-1.el7.x86_64.rpm
rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm
rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm
rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm
rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm
rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm
rh-php56-runtime-2.3-1.el7.x86_64.rpm
rh-php56-scldevel-2.3-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2013-7456
https://access.redhat.com/security/cve/CVE-2014-9767
https://access.redhat.com/security/cve/CVE-2015-2325
https://access.redhat.com/security/cve/CVE-2015-2326
https://access.redhat.com/security/cve/CVE-2015-2327
https://access.redhat.com/security/cve/CVE-2015-2328
https://access.redhat.com/security/cve/CVE-2015-3210
https://access.redhat.com/security/cve/CVE-2015-3217
https://access.redhat.com/security/cve/CVE-2015-5073
https://access.redhat.com/security/cve/CVE-2015-8381
https://access.redhat.com/security/cve/CVE-2015-8383
https://access.redhat.com/security/cve/CVE-2015-8384
https://access.redhat.com/security/cve/CVE-2015-8385
https://access.redhat.com/security/cve/CVE-2015-8386
https://access.redhat.com/security/cve/CVE-2015-8388
https://access.redhat.com/security/cve/CVE-2015-8391
https://access.redhat.com/security/cve/CVE-2015-8392
https://access.redhat.com/security/cve/CVE-2015-8395
https://access.redhat.com/security/cve/CVE-2015-8835
https://access.redhat.com/security/cve/CVE-2015-8865
https://access.redhat.com/security/cve/CVE-2015-8866
https://access.redhat.com/security/cve/CVE-2015-8867
https://access.redhat.com/security/cve/CVE-2015-8873
https://access.redhat.com/security/cve/CVE-2015-8874
https://access.redhat.com/security/cve/CVE-2015-8876
https://access.redhat.com/security/cve/CVE-2015-8877
https://access.redhat.com/security/cve/CVE-2015-8879
https://access.redhat.com/security/cve/CVE-2016-1903
https://access.redhat.com/security/cve/CVE-2016-2554
https://access.redhat.com/security/cve/CVE-2016-3074
https://access.redhat.com/security/cve/CVE-2016-3141
https://access.redhat.com/security/cve/CVE-2016-3142
https://access.redhat.com/security/cve/CVE-2016-4070
https://access.redhat.com/security/cve/CVE-2016-4071
https://access.redhat.com/security/cve/CVE-2016-4072
https://access.redhat.com/security/cve/CVE-2016-4073
https://access.redhat.com/security/cve/CVE-2016-4342
https://access.redhat.com/security/cve/CVE-2016-4343
https://access.redhat.com/security/cve/CVE-2016-4473
https://access.redhat.com/security/cve/CVE-2016-4537
https://access.redhat.com/security/cve/CVE-2016-4538
https://access.redhat.com/security/cve/CVE-2016-4539
https://access.redhat.com/security/cve/CVE-2016-4540
https://access.redhat.com/security/cve/CVE-2016-4541
https://access.redhat.com/security/cve/CVE-2016-4542
https://access.redhat.com/security/cve/CVE-2016-4543
https://access.redhat.com/security/cve/CVE-2016-4544
https://access.redhat.com/security/cve/CVE-2016-5093
https://access.redhat.com/security/cve/CVE-2016-5094
https://access.redhat.com/security/cve/CVE-2016-5096
https://access.redhat.com/security/cve/CVE-2016-5114
https://access.redhat.com/security/cve/CVE-2016-5399
https://access.redhat.com/security/cve/CVE-2016-5766
https://access.redhat.com/security/cve/CVE-2016-5767
https://access.redhat.com/security/cve/CVE-2016-5768
https://access.redhat.com/security/cve/CVE-2016-5770
https://access.redhat.com/security/cve/CVE-2016-5771
https://access.redhat.com/security/cve/CVE-2016-5772
https://access.redhat.com/security/cve/CVE-2016-5773
https://access.redhat.com/security/cve/CVE-2016-6128
https://access.redhat.com/security/cve/CVE-2016-6207
https://access.redhat.com/security/cve/CVE-2016-6288
https://access.redhat.com/security/cve/CVE-2016-6289
https://access.redhat.com/security/cve/CVE-2016-6290
https://access.redhat.com/security/cve/CVE-2016-6291
https://access.redhat.com/security/cve/CVE-2016-6292
https://access.redhat.com/security/cve/CVE-2016-6294
https://access.redhat.com/security/cve/CVE-2016-6295
https://access.redhat.com/security/cve/CVE-2016-6296
https://access.redhat.com/security/cve/CVE-2016-6297
https://access.redhat.com/security/cve/CVE-2016-7124
https://access.redhat.com/security/cve/CVE-2016-7125
https://access.redhat.com/security/cve/CVE-2016-7126
https://access.redhat.com/security/cve/CVE-2016-7127
https://access.redhat.com/security/cve/CVE-2016-7128
https://access.redhat.com/security/cve/CVE-2016-7129
https://access.redhat.com/security/cve/CVE-2016-7130
https://access.redhat.com/security/cve/CVE-2016-7131
https://access.redhat.com/security/cve/CVE-2016-7132
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFYKvj4XlSAg2UNWIIRAqg2AKCB6Jcysv4gkiktKAJA3gy+RKlAqwCeJpjs
UCuj+0gWfBsWXOgFhgH0uL8=
=FcPG
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05240731
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05240731
Version: 1
HPSBNS03635 rev.1 - HPE NonStop Servers OSS Script Languages running Perl and
PHP, Multiple Local and Remote Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2016-08-19
Last Updated: 2016-08-19
Potential Security Impact: Local Denial of Service (DoS), Elevation of
Privilege, Remote Denial of Service (DoS), Execution of Arbitrary Code,
Unauthorized Disclosure of Information, Unauthorized Modification
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential remote and local vulnerabilities impacting Perl and PHP
have been addressed by HPE NonStop Servers OSS Script Languages. The
vulnerabilities include Perl's opportunistic loading of optional modules
which might allow local users to gain elevation of privilege via a Trojan
horse library under the current working directory.
References:
- CVE-2016-1238 - Perl Local Elevation of Privilege
- CVE-2016-2381 - Perl Remote Unauthorized Modification
- CVE-2014-4330 - Perl Local Denial of Service (DoS)
**Note:** applies only for the H/J-series SPR. Fix was already
provided in a previous L-series SPR.
OSS Script Languages (T1203) T1203H01 through T1203H01^AAD, T1203L01 and
T1203L01^AAC
*Impacted releases:*
- L15.02
- L15.08.00, L15.08.01
- L16.05.00
- J06.14 through J06.16.02
- J06.17.00, J06.17.01
- J06.18.00, J06.18.01
- J06.19.00, J06.19.01, J06.19.02
- J06.20.00
- H06.25 through H06.26.01
- H06.27.00, H06.27.01
- H06.28.00, H06.28.01
- H06.29.00, H06.29.01
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2013-7456
7.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2014-4330
4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)
CVE-2015-8383
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8386
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8387
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8389
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8390
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8391
8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
9.0 (AV:N/AC:L/Au:N/C:P/I:P/A:C)
CVE-2015-8393
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-8394
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8607
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8853
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2015-8865
7.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-8874
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-1238
6.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C)
CVE-2016-1903
9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVE-2016-2381
6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVE-2016-2554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-3074
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4070
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-4071
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4072
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4073
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4342
8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)
CVE-2016-4343
8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-4537
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4538
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4541
9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4542
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4543
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5093
8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5094
8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5096
8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5114
9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVE-2016-5766
8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-5767
8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-5768
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5769
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5770
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5771
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5772
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5773
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has released the following software updates to resolve the
vulnerabilities in NonStop Servers OSS Script Languages running Perl and PHP.
Install one of the SPRs below as appropriate for the system's release
version:
+ L-Series:
* T1203L01^AAE (OSS Scripting Languages) - already available
This SPR already is present in these RVUs: None
This SPR is usable with the following RVUs:
- L15.02 through L16.05.00
+ H and J-Series:
* T1203H01^AAF (OSS Scripting Languages) - already available
This SPR already is present in these RVUs: None
This SPR is usable with the following RVUs:
- J06.14 through J06.20.00
- H06.25 through H06.29.01
**Note:** Please refer to *NonStop Hotstuff HS03333* for more information.
HISTORY
Version:1 (rev.1) - 19 August 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3560-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 27, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : php5
CVE ID : CVE-2015-8865 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072
CVE-2016-4073
Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. Please refer to the
upstream changelog for more information:
https://php.net/ChangeLog-5.php#5.6.20
For the stable distribution (jessie), these problems have been fixed in
version 5.6.20+dfsg-0+deb8u1.
We recommend that you upgrade your php5 packages.
Background
==========
PHP is a widely-used general-purpose scripting language that is
especially suited for Web development and can be embedded into HTML.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/php < 5.6.28 >= 5.6.28
Description
===========
Multiple vulnerabilities have been discovered in PHP. Please review the
CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PHP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.28"
References
==========
[ 1 ] CVE-2015-8865
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865
[ 2 ] CVE-2016-3074
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074
[ 3 ] CVE-2016-4071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071
[ 4 ] CVE-2016-4072
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072
[ 5 ] CVE-2016-4073
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073
[ 6 ] CVE-2016-4537
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537
[ 7 ] CVE-2016-4538
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538
[ 8 ] CVE-2016-4539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539
[ 9 ] CVE-2016-4540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540
[ 10 ] CVE-2016-4541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541
[ 11 ] CVE-2016-4542
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542
[ 12 ] CVE-2016-4543
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543
[ 13 ] CVE-2016-4544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544
[ 14 ] CVE-2016-5385
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385
[ 15 ] CVE-2016-6289
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289
[ 16 ] CVE-2016-6290
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290
[ 17 ] CVE-2016-6291
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291
[ 18 ] CVE-2016-6292
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292
[ 19 ] CVE-2016-6294
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294
[ 20 ] CVE-2016-6295
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295
[ 21 ] CVE-2016-6296
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296
[ 22 ] CVE-2016-6297
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297
[ 23 ] CVE-2016-7124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124
[ 24 ] CVE-2016-7125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125
[ 25 ] CVE-2016-7126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126
[ 26 ] CVE-2016-7127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127
[ 27 ] CVE-2016-7128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128
[ 28 ] CVE-2016-7129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129
[ 29 ] CVE-2016-7130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130
[ 30 ] CVE-2016-7131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131
[ 31 ] CVE-2016-7132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132
[ 32 ] CVE-2016-7133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133
[ 33 ] CVE-2016-7134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134
[ 34 ] CVE-2016-7411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411
[ 35 ] CVE-2016-7412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412
[ 36 ] CVE-2016-7413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413
[ 37 ] CVE-2016-7414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414
[ 38 ] CVE-2016-7416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416
[ 39 ] CVE-2016-7417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417
[ 40 ] CVE-2016-7418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201611-22
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201603-0074 | CVE-2015-8655 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-8048 , CVE-2015-8049 , CVE-2015-8050 , CVE-2015-8055 , CVE-2015-8056 , CVE-2015-8057 , CVE-2015-8058 , CVE-2015-8059 , CVE-2015-8061 , CVE-2015-8062 , CVE-2015-8063 , CVE-2015-8064 , CVE-2015-8065 , CVE-2015-8066 , CVE-2015-8067 , CVE-2015-8068 , CVE-2015-8069 , CVE-2015-8070 , CVE-2015-8071 , CVE-2015-8401 , CVE-2015-8402 , CVE-2015-8403 , CVE-2015-8404 , CVE-2015-8405 , CVE-2015-8406 , CVE-2015-8410 , CVE-2015-8411 , CVE-2015-8412 , CVE-2015-8413 , CVE-2015-8414 , CVE-2015-8420 , CVE-2015-8421 , CVE-2015-8422 , CVE-2015-8423 , CVE-2015-8424 , CVE-2015-8425 , CVE-2015-8426 , CVE-2015-8427 , CVE-2015-8428 , CVE-2015-8429 , CVE-2015-8430 , CVE-2015-8431 , CVE-2015-8432 , CVE-2015-8433 , CVE-2015-8434 , CVE-2015-8435 , CVE-2015-8436 , CVE-2015-8437 , CVE-2015-8441 , CVE-2015-8442 , CVE-2015-8447 , CVE-2015-8448 , CVE-2015-8449 , CVE-2015-8450 , CVE-2015-8452 , CVE-2015-8454 , CVE-2015-8653 , CVE-2015-8821 ,and CVE-2015-8822 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers MPEG-4 An arbitrary code may be executed via the data. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force a dangling pointer to be reused after it has been freed. Adobe Flash Player, Adobe AIR SDK and Adobe AIR SDK & Compiler are all products of American Adobe (Adobe). A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0073 | CVE-2015-8654 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, and CVE-2015-8820. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force Adobe Flash to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute code under the context of the current process. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0072 | CVE-2015-8653 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-8048 , CVE-2015-8049 , CVE-2015-8050 , CVE-2015-8055 , CVE-2015-8056 , CVE-2015-8057 , CVE-2015-8058 , CVE-2015-8059 , CVE-2015-8061 , CVE-2015-8062 , CVE-2015-8063 , CVE-2015-8064 , CVE-2015-8065 , CVE-2015-8066 , CVE-2015-8067 , CVE-2015-8068 , CVE-2015-8069 , CVE-2015-8070 , CVE-2015-8071 , CVE-2015-8401 , CVE-2015-8402 , CVE-2015-8403 , CVE-2015-8404 , CVE-2015-8405 , CVE-2015-8406 , CVE-2015-8410 , CVE-2015-8411 , CVE-2015-8412 , CVE-2015-8413 , CVE-2015-8414 , CVE-2015-8420 , CVE-2015-8421 , CVE-2015-8422 , CVE-2015-8423 , CVE-2015-8424 , CVE-2015-8425 , CVE-2015-8426 , CVE-2015-8427 , CVE-2015-8428 , CVE-2015-8429 , CVE-2015-8430 , CVE-2015-8431 , CVE-2015-8432 , CVE-2015-8433 , CVE-2015-8434 , CVE-2015-8435 , CVE-2015-8436 , CVE-2015-8437 , CVE-2015-8441 , CVE-2015-8442 , CVE-2015-8447 , CVE-2015-8448 , CVE-2015-8449 , CVE-2015-8450 , CVE-2015-8452 , CVE-2015-8454 , CVE-2015-8655 , CVE-2015-8821 ,and CVE-2015-8822 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers MPEG-4 An arbitrary code may be executed via the data. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force a dangling pointer to be reused after it has been freed. Adobe Flash Player, Adobe AIR SDK and Adobe AIR SDK & Compiler are all products of American Adobe (Adobe). A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0071 | CVE-2015-8652 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, and CVE-2015-8820. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force Adobe Flash to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute code under the context of the current process. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0069 | CVE-2015-8657 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8658, and CVE-2015-8820. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force Adobe Flash to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute code under the context of the current process. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0070 | CVE-2015-8658 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, and CVE-2015-8820. This vulnerability CVE-2015-8045 , CVE-2015-8047 , CVE-2015-8060 , CVE-2015-8408 , CVE-2015-8416 , CVE-2015-8417 , CVE-2015-8418 , CVE-2015-8419 , CVE-2015-8443 , CVE-2015-8444 , CVE-2015-8451 , CVE-2015-8455 , CVE-2015-8652 , CVE-2015-8654 , CVE-2015-8656 , CVE-2015-8657 ,and CVE-2015-8820 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force the dereference of an uninitialized pointer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0
| VAR-201603-0068 | CVE-2015-8656 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8657, CVE-2015-8658, and CVE-2015-8820. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force Adobe Flash to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute code under the context of the current process. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
| VAR-201603-0054 | CVE-2015-8822 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-8048 , CVE-2015-8049 , CVE-2015-8050 , CVE-2015-8055 , CVE-2015-8056 , CVE-2015-8057 , CVE-2015-8058 , CVE-2015-8059 , CVE-2015-8061 , CVE-2015-8062 , CVE-2015-8063 , CVE-2015-8064 , CVE-2015-8065 , CVE-2015-8066 , CVE-2015-8067 , CVE-2015-8068 , CVE-2015-8069 , CVE-2015-8070 , CVE-2015-8071 , CVE-2015-8401 , CVE-2015-8402 , CVE-2015-8403 , CVE-2015-8404 , CVE-2015-8405 , CVE-2015-8406 , CVE-2015-8410 , CVE-2015-8411 , CVE-2015-8412 , CVE-2015-8413 , CVE-2015-8414 , CVE-2015-8420 , CVE-2015-8421 , CVE-2015-8422 , CVE-2015-8423 , CVE-2015-8424 , CVE-2015-8425 , CVE-2015-8426 , CVE-2015-8427 , CVE-2015-8428 , CVE-2015-8429 , CVE-2015-8430 , CVE-2015-8431 , CVE-2015-8432 , CVE-2015-8433 , CVE-2015-8434 , CVE-2015-8435 , CVE-2015-8436 , CVE-2015-8437 , CVE-2015-8441 , CVE-2015-8442 , CVE-2015-8447 , CVE-2015-8448 , CVE-2015-8449 , CVE-2015-8450 , CVE-2015-8452 , CVE-2015-8454 , CVE-2015-8653 , CVE-2015-8655 ,and CVE-2015-8821 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers MPEG-4 An arbitrary code may be executed via the data. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within MPEG-4 parsing. A specially crafted MP4 file can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 19.0.0.245 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 19.0 on Windows 8.0 and 8.1 .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0