|
Message-Id: <20160902180635.8B84534E010@smtpvbsrv1.mitre.org> Date: Fri, 2 Sep 2016 14:06:35 -0400 (EDT) From: cve-assign@...re.org To: kaplanlior@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security@....net Subject: Re: CVE assignment for PHP 5.6.25 and 7.0.10 - and libcurl -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > Bug #72663 <https://bugs.php.net/bug.php?id=72663> Create an Unexpected > Object and Don't Invoke __wakeup() in Deserialization > https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 Use CVE-2016-7124 for this one issue, regardless of the subsequent behavior (i.e., either "i) The unexpected object was destroyed, invoke __destruct()" or "ii) The unexpected object wasn't destroyed, invoke more magic methods."). > Bug #72681 <https://bugs.php.net/bug.php?id=72681> PHP Session Data > Injection Vulnerability > https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 Use CVE-2016-7125. The scope of this CVE also includes the "The similar issue also exist in session php_binary handler" part of 72681. > Bug #72697 <https://bugs.php.net/bug.php?id=72697> select_colors write > out-of-bounds > https://github.com/php/php-src/commit/b6f13a5ef9d6280cf984826a5de012a32c396cd4?w=1 Use CVE-2016-7126. > Bug #72730 <https://bugs.php.net/bug.php?id=72730> imagegammacorrect allows > arbitrary write access > https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 Use CVE-2016-7127. > Bug #72627 <https://bugs.php.net/bug.php?id=72627> Memory Leakage In > exif_process_IFD_in_TIFF > https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 Use CVE-2016-7128. > Bug #72749 <https://bugs.php.net/bug.php?id=72749> wddx_deserialize allows > illegal memory access > https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 Use CVE-2016-7129. > Bug #72750 <https://bugs.php.net/bug.php?id=72750> wddx_deserialize null > dereference > https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 Use CVE-2016-7130. > Bug #72790 <https://bugs.php.net/bug.php?id=72790> wddx_deserialize null > dereference with invalid xml > https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 Use CVE-2016-7131. (72790 and 72799 are associated with the same commit. Not all of the commit is about the pop issue in 72799.) > Bug #72799 <https://bugs.php.net/bug.php?id=72799> wddx_deserialize null > dereference in php_wddx_pop_element > https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 Use CVE-2016-7132. (72790 and 72799 are associated with the same commit. Not all of the commit is about the pop issue in 72799.) > Bug #72742 <https://bugs.php.net/bug.php?id=72742> memory allocator fails > to realloc small block to large one > https://github.com/php/php-src/commit/c2a13ced4272f2e65d2773e2ea6ca11c1ce4a911?w=1 Use CVE-2016-7133. > Bug #72674 <https://bugs.php.net/bug.php?id=72674> Heap overflow in > curl_escape > https://github.com/php/php-src/commit/72dbb7f416160f490c4e9987040989a10ad431c7?w=1 Use CVE-2016-7134 for the PHP vulnerability. In other words, PHP is intended to operate safely even with an unpatched copy of libcurl. This is associated with the https://curl.haxx.se/libcurl/c/curl_easy_escape.html and http://php.net/manual/en/function.curl-escape.php relationship. We feel that this may be a (minor) vulnerability in libcurl. It seems plausible that a libcurl application could accept arbitrary length URI components from an untrusted user, for use in GET requests to (probably) a hardcoded server name. However, it is possible that CVE ID assignment is already in progress for libcurl. If nobody knows, then we will contact curl-security@...x.se directly to ask. (As far as we can tell, it is not yet fixed on the https://github.com/curl/curl/commits/master/lib/escape.c page.) - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJXyb7tAAoJEHb/MwWLVhi2AaEQAKw2gJTWFh28/4amAkRFK5KF tnP6xJLeyOlFdzrty/EWzzCsWHX/30uc2KulranEUaC/89LIrl4QqsFHmDPdG7am Ai5zvsdW1NVz1fISzV1zYFX6FQBZTfr3VinQVY4Uacg743mn8Ewp+RvRAHelwBB3 EvoBI5AkQlmWdSRamTiy+ionzNge9TlmgdCSdTfWGERYAfyaWRENNqOX/ocmb0p1 M2YUbV7Hi2F1fRWiNyjdk+F+GLgEyercCDDwdnkc0L8mluH447ULDk2756Ww0+yZ yy1Jj+zgDmH62ps3lobik7dhuIEdIIUPCkY2W0WQXbLWFZusrBG9SkEQk2P99g65 1Ajcuml+W2LyotgzIa+OOhlLb/+hw9+qsuyuXtYnhlBZ85wjeqNsLy+KduFQdX70 jK82NAW4ZTujrbn/cBxn4ad0YDZCMQ8BkwtJEz722wruidAXFnfesqwTgBz+MoLA ukUKk4gkB/JEMDoVwZGeyEUKoy6Q3xllQHnP4l3nQC9FgZy/qXLShjhMk1N215ib 1v0Ofk9QL3XRpww4JxepfbzCJe4NJaYPRC1vAvRHUYS+zvBny8PcE1NNKih6cCSt v0sXl7jOIEs1haHxU3kfCbjij8wCWdqFgSyL4FYD0WM6Xu3Jwa+zevkJ+hKKe37w BaxLqvFCiflOsCUKeMJU =3zTJ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.