ESB-2019.0632 - [Win][Linux][Debian] php7.0: Multiple vulnerabilities 2019-03-01

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0632
                          php7.0 security update
                               1 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php7.0
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Linux variants
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-9024 CVE-2019-9023 CVE-2019-9022
                   CVE-2019-9021 CVE-2019-9020 

Original Bulletin: 
   http://www.debian.org/security/2019/dsa-4398

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running php7.0 check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4398-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 28, 2019                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : php7.0
CVE ID         : CVE-2019-9020 CVE-2019-9021 CVE-2019-9022 CVE-2019-9023 
                 CVE-2019-9024

Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language: Multiple out-of-bounds memory
accesses were found in the xmlrpc, mbstring and phar extensions and
the dns_get_record() function.

For the stable distribution (stretch), these problems have been fixed in
version 7.0.33-0+deb9u2.

We recommend that you upgrade your php7.0 packages.

For the detailed security status of php7.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlx4WgIACgkQEMKTtsN8
TjZMXQ/+OPjr90meyXOol5+cpyBgoTNAMilfIgmadI6cKjZp9SEeDUYsbwmufSD0
Ijj5MACGM2o8D4IOybibE1xYNKe7IFajyCi51Mq/KCEYRIsIRjL8Uc2IuIu7+u4e
nOz3C4PDV+MjBvapzFARtwa04IPsiicT71DrBFjOEbISgRBkzhlFdTQfIGen8WWK
sDb+iGDGMyFn4CGiHJixlFjYjkUmQ2sD8SH8/+UGN4uRJ4I4dlcL5C8xA8qb6pQi
HWigJ9nXpKjLsONPf7wLsJ1zTTo5LzrxEHfA1bt79SxBgtCvrTut/n1YDrTOtqzO
EDZ1SWSBZJ8pbBHCBwGZymu+km8QiK6jALXxgWj4Exrq3IXW3pJFrY5CSiDAGL1i
OU6aJEJe5XbG6cbUq2o1MKTZz28zO1zsVnpnCjyE8+Rqar9WtTWEG8MX/VXY28iv
aHK5BOpL8KutqDyN0R2pgKjbL/M0xb0iTHYywvx54GSEZU9D3ZbpFJdChTk1pj3q
mKzAUdw2C/oriuAzmdK070qNVtMTe+1bXuxXDroRNWJ4mpInUcmIgIwS+DKN7/1F
Jbnl0/UvNfEVsv4UuUSwvZWnE7ufRYQrnH6IAjcpjfCy37WEq7gMEPNZ/LiM3BeV
2cXq0eMgmv/CYE1gvv1ZZGOaqeKXoK8pN0bziFGqpNQKboCi+uk=
=02HS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=3G1K
-----END PGP SIGNATURE-----

« Back to bulletins