Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170710134001.GF24936@suse.de>
Date: Mon, 10 Jul 2017 15:40:01 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>, security@....net,
	kaplanlior@...il.com
Subject: PHP CVE assignments: [cve-request@...re.org: Re: [scr358150] 7 PHP
 CVEs]

Hi,

Raw form of PHP CVE assignments.

If I made a mistake feel free to update via webform or mail me so I can do.

Ciao, Marcus

Return-Path: <meissner@...e.de>
Delivered-To: meissner@...p.suse.de
Received: from imap.suse.de
	by imap3-int with LMTP id eLPlOa2BY1m2TQAALh3uQQ
	for <meissner@...p.suse.de>; Mon, 10 Jul 2017 13:31:25 +0000
Received: from relay1.suse.de (gate-dmz1.suse.de [195.135.220.254])
	by imap.suse.de (Postfix) with ESMTP id E803211B6F
	for <meissner@...p-int.suse.de>; Mon, 10 Jul 2017 13:31:25 +0000 (UTC)
Received: from wotan.suse.de (wotan.suse.de [10.160.0.1])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by relay1.suse.de (Postfix) with ESMTPS id DFBA825CB4
	for <meissner@...p-int.suse.de>; Mon, 10 Jul 2017 13:31:24 +0000 (UTC)
Received: by wotan.suse.de (Postfix, from userid 10574)
	id DAAA3622A; Mon, 10 Jul 2017 15:31:24 +0200 (CEST)
X-Original-To: meissner@...an.suse.de
Received: from relay1.suse.de (relay1.suse.de [149.44.160.133])
	by wotan.suse.de (Postfix) with ESMTP id D1A10609C
	for <meissner@...an.suse.de>; Mon, 10 Jul 2017 15:31:24 +0200 (CEST)
Received: by relay1.suse.de (Postfix)
	id C1A3126017; Mon, 10 Jul 2017 13:31:24 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
	by relay1.suse.de (Postfix) with ESMTP id BF15A26016
	for <meissner@...e.de>; Mon, 10 Jul 2017 13:31:24 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at localhost
X-Spam-Flag: NO
X-Spam-Score: -1.51
X-Spam-Level:
X-Spam-Status: No, score=-1.51 tagged_above=-9999 required=5
	tests=[BAYES_50=0.8, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01]
	autolearn=disabled
Received: from relay1.suse.de ([127.0.0.1])
	by localhost (localhost [127.0.0.1]) (amavisd-new, port 10026)
	with ESMTP id H8JTgdZVR9MU for <meissner@...e.de>;
	Mon, 10 Jul 2017 13:31:23 +0000 (UTC)
Received: from mx1.suse.de (mx1.suse.de [195.135.220.2])
	(using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by relay1.suse.de (Postfix) with ESMTPS id B526D25CB4
	for <meissner@...e.de>; Mon, 10 Jul 2017 13:31:23 +0000 (UTC)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136])
	by mx1.suse.de (Postfix) with ESMTP id 6220FAA6E
	for <meissner@...e.de>; Mon, 10 Jul 2017 13:31:23 +0000 (UTC)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1])
	by localhost (Postfix) with SMTP id 5E6536C00A3;
	Mon, 10 Jul 2017 09:31:22 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (imshyb01.mitre.org [129.83.29.2])
	by smtpvmsrv1.mitre.org (Postfix) with ESMTP id 50A7F6C00AF;
	Mon, 10 Jul 2017 09:31:22 -0400 (EDT)
Received: from imshyb02.MITRE.ORG (129.83.29.3) by imshyb01.MITRE.ORG
 (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 10 Jul
 2017 09:31:21 -0400
Received: from rcf-smtp.mitre.org (10.140.19.249) by imshyb02.MITRE.ORG
 (129.83.29.3) with Microsoft SMTP Server id 15.0.1263.5 via Frontend
 Transport; Mon, 10 Jul 2017 09:31:22 -0400
Received: from cvecmssrv1.mitre.org (cvecmssrv1.mitre.org [129.83.19.107])
	by rcf-smtp.mitre.org (Postfix) with SMTP id C5E0C18002E;
	Mon, 10 Jul 2017 09:30:57 -0400 (EDT)
From: <cve-request@...re.org>
To: <meissner@...e.de>
CC: <cve-request@...re.org>
Subject: Re: [scr358150] 7 PHP CVEs
Message-ID: <682966c1d3d34f709abfc33f5e12a040@...hyb02.MITRE.ORG>
Date: Mon, 10 Jul 2017 09:31:22 -0400
MIME-Version: 1.0
Old-Content-Type: text/plain
Content-Type: application/pgp; format=text; x-action=sign

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> [Suggested description]
> In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3,
> remote attackers could cause a CPU consumption denial of service attack by injecting long form variables,
> related to main/php_variables.c.
> 
> ------------------------------------------
> 
> [VulnerabilityType Other]
> CWE-407
> 
> ------------------------------------------
> 
> [Vendor of Product]
> PHP
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - 5.6 before 5.6.31
> php - 7.0 before 7.0.17
> php - 7.1 before 7.1.3
> 
> ------------------------------------------
> 
> [Affected Component]
> processing of FORM variables
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> ------------------------------------------
> 
> [Impact Denial of Service]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> remote
> 
> ------------------------------------------
> 
> [Reference]
> https://bugs.php.net/bug.php?id=73807
> https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
> https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
> http://php.net/ChangeLog-7.php
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
> 
> ------------------------------------------
> 
> [Discoverer]
> pparadowski at media4u dot pl

Use CVE-2017-11142.


> [Suggested description]
> In PHP before 5.6.31,
> an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter,
> related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
> 
> ------------------------------------------
> 
> [VulnerabilityType Other]
> CWE-763
> 
> ------------------------------------------
> 
> [Vendor of Product]
> PHP
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> PHP - 5.6 before 5.6.31
> 
> ------------------------------------------
> 
> [Affected Component]
> WDDX extension of PHP
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> ------------------------------------------
> 
> [Impact Denial of Service]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> injecting bad XML into the WDDX deserializer
> 
> ------------------------------------------
> 
> [Reference]
> https://bugs.php.net/bug.php?id=74145
> https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
> 
> ------------------------------------------
> 
> [Discoverer]
> varsleak at gmail dot com

Use CVE-2017-11143.


> [Suggested description]
> In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7,
> the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter,
> related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
> 
> ------------------------------------------
> 
> [Vulnerability Type]
> Buffer Overflow
> 
> ------------------------------------------
> 
> [Vendor of Product]
> PHP
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - 5.6 before 5.6.31
> php - 7.1.7, 7.0.21
> 
> ------------------------------------------
> 
> [Affected Component]
> php openssl extension
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> ------------------------------------------
> 
> [Impact Code execution]
> true
> 
> ------------------------------------------
> 
> [Impact Denial of Service]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> decoding a supplied PEM file
> 
> ------------------------------------------
> 
> [Reference]
> https://bugs.php.net/bug.php?id=74651
> http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
> http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
> http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
> http://php.net/ChangeLog-7.php
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Discoverer]
> Sebastian Li, Wei Lei, Xie Xiaofei and Liu Yang of Nanyang Technological University

Use CVE-2017-11144.


> [Suggested description]
> In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7,
> lack of a bounds check in the date extension's timelib_meridian parsing code could be used by attackers able to supply date
> strings to leak information from the interpreter, related to an ext/date/lib/parse_date.c out-of-bounds read affecting the
> php_parse_date function.
> 
> ------------------------------------------
> 
> [VulnerabilityType Other]
> CWE-126
> 
> ------------------------------------------
> 
> [Vendor of Product]
> php
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - all versions 5.6.31 7.0.21 7.1.7
> 
> ------------------------------------------
> 
> [Affected Component]
> PHP date parsing library
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> ------------------------------------------
> 
> [Impact Information Disclosure]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> Parsing invalid dates with timelib_meridian function
> 
> ------------------------------------------
> 
> [Reference]
> https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
> https://bugs.php.net/bug.php?id=74819
> http://php.net/ChangeLog-7.php
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
> 
> ------------------------------------------
> 
> [Discoverer]
> l dot wei at ntu dot edu dot sg

Use CVE-2017-11145.


> [Suggested description]
> In PHP through 5.6.31, 7.x through 7.0.21, and 7.1.x through 7.1.7,
> lack of bounds checks in the date extension's timelib_meridian parsing code could be used by attackers able to supply date
> strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the
> php_parse_date function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11145.
> 
> ------------------------------------------
> 
> [VulnerabilityType Other]
> CWE-126
> 
> ------------------------------------------
> 
> [Vendor of Product]
> php
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - all versions 5.6.31 7.0.21 7.1.7
> 
> ------------------------------------------
> 
> [Affected Component]
> PHP date parsing library
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> ------------------------------------------
> 
> [Impact Information Disclosure]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> Parsing invalid dates with timelib_meridian function
> 
> ------------------------------------------
> 
> [Reference]
> https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
> https://bugs.php.net/bug.php?id=74819
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
> 
> ------------------------------------------
> 
> [Discoverer]
> l dot wei at ntu dot edu dot sg

Use CVE-2017-11146.


> [Suggested description]
> In PHP before 5.6.30 and 7.x before 7.0.15,
> the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or
> potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
> 
> ------------------------------------------
> 
> [Vulnerability Type]
> Buffer Overflow
> 
> ------------------------------------------
> 
> [Vendor of Product]
> php
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - 5.6 before 5.6.30
> php - 7.0 before 7.0.15
> 
> ------------------------------------------
> 
> [Affected Component]
> PHP Phar parser
> 
> ------------------------------------------
> 
> [Attack Type]
> Local
> 
> ------------------------------------------
> 
> [Impact Denial of Service]
> true
> 
> ------------------------------------------
> 
> [Impact Information Disclosure]
> true
> 
> ------------------------------------------
> 
> [Attack Vectors]
> supplying a malicious PHAR archive
> 
> ------------------------------------------
> 
> [Reference]
> https://bugs.php.net/bug.php?id=73773
> http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
> http://php.net/ChangeLog-7.php
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6

Use CVE-2017-11147.


> [Suggested description]
> In PHP before 5.6.28 and 7.x before 7.0.13,
> incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks,
> as demonstrated by 
> evil.example.com:80#@...d.example.com/
> and
> evil.example.com:80?@...d.example.com/ inputs to the parse_url function (implemented in the
> php_url_parse_ex function in ext/standard/url.c).
> 
> ------------------------------------------
> 
> [VulnerabilityType Other]
> CWE-74
> 
> ------------------------------------------
> 
> [Vendor of Product]
> PHP
> 
> ------------------------------------------
> 
> [Affected Product Code Base]
> php - 5.6 before 5.6.28
> php - 7.0 before 7.0.13
> 
> ------------------------------------------
> 
> [Affected Component]
> hostname parsing in the URL parser
> 
> ------------------------------------------
> 
> [Attack Type]
> Context-dependent
> 
> ------------------------------------------
> 
> [CVE Impact Other]
> hostname parsing bypasses
> 
> ------------------------------------------
> 
> [Attack Vectors]
> attackers able to supply URL for parsing
> 
> ------------------------------------------
> 
> [Reference]
> https://bugs.php.net/bug.php?id=73192
> http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
> http://php.net/ChangeLog-7.php
> http://php.net/ChangeLog-5.php
> http://openwall.com/lists/oss-security/2017/07/10/6
> 
> ------------------------------------------
> 
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
> 
> ------------------------------------------
> 
> [Discoverer]
> mala at ma dot la

Use CVE-2016-10397.


- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uxf6
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.