First published: Mon Dec 18 2017(Updated: )
USN-3382-1 fixed several vulnerabilities in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that the PHP URL parser incorrectly handled certain URI components. A remote attacker could possibly use this issue to bypass hostname-specific URL checks. (CVE-2016-10397) It was discovered that PHP incorrectly handled certain boolean parameters when unserializing data. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11143) Sebastian Li, Wei Lei, Xie Xiaofei, and Liu Yang discovered that PHP incorrectly handled the OpenSSL sealing function. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11144) Wei Lei and Liu Yang discovered that the PHP date extension incorrectly handled memory. A remote attacker could possibly use this issue to disclose sensitive information from the server. (CVE-2017-11145) It was discovered that PHP incorrectly handled certain PHAR archives. A remote attacker could use this issue to cause PHP to crash or disclose sensitive information. This issue only affected Ubuntu 14.04 LTS. (CVE-2017-11147) Wei Lei and Liu Yang discovered that PHP incorrectly handled parsing ini files. An attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11628) It was discovered that PHP mbstring incorrectly handled certain regular expressions. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php5-cli | <5.3.10-1ubuntu3.28 | 5.3.10-1ubuntu3.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/php5 | <5.3.10-1ubuntu3.28 | 5.3.10-1ubuntu3.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/libapache2-mod-php5 | <5.3.10-1ubuntu3.28 | 5.3.10-1ubuntu3.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/php5-fpm | <5.3.10-1ubuntu3.28 | 5.3.10-1ubuntu3.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/php5-cgi | <5.3.10-1ubuntu3.28 | 5.3.10-1ubuntu3.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of USN-3382-2 is CVE-2017-11144.
The severity of CVE-2017-11144 is high.
CVE-2017-11144 affects Ubuntu 12.04 with PHP 5.3.10-1ubuntu3.28 by allowing a remote attacker to execute arbitrary code via a crafted SOAP WSDL file.
To fix CVE-2017-11144, you should update PHP to version 5.3.10-1ubuntu3.28 or later.
You can find more information about CVE-2017-11144 on the Ubuntu Security website: https://ubuntu.com/security/CVE-2017-11144