{"id":"USN-2984-1","summary":"php5, php7.0 vulnerabilities","details":"It was discovered that the PHP Fileinfo component incorrectly handled\ncertain magic files. An attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865)\n\nHans Jerry Illikainen discovered that the PHP Zip extension incorrectly\nhandled certain malformed Zip archives. A remote attacker could use this\nissue to cause PHP to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 16.04 LTS.\n(CVE-2016-3078)\n\nIt was discovered that PHP incorrectly handled invalid indexes in the\nSplDoublyLinkedList class. An attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132)\n\nIt was discovered that the PHP rawurlencode() function incorrectly handled\nlarge strings. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n16.04 LTS. (CVE-2016-4070)\n\nIt was discovered that the PHP php_snmp_error() function incorrectly\nhandled string formatting. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071)\n\nIt was discovered that the PHP phar extension incorrectly handled certain\nfilenames in archives. A remote attacker could use this issue to cause PHP\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4072)\n\nIt was discovered that the PHP mb_strcut() function incorrectly handled\nstring formatting. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073)\n\nIt was discovered that the PHP phar extension incorrectly handled certain\narchive files. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and\nUbuntu 15.10. (CVE-2016-4342, CVE-2016-4343)\n\nIt was discovered that the PHP bcpowmod() function incorrectly handled\nmemory. A remote attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly execute arbitrary code. \n(CVE-2016-4537, CVE-2016-4538)\n\nIt was discovered that the PHP XML parser incorrectly handled certain\nmalformed XML data. A remote attacker could possibly use this issue to\ncause PHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-4539)\n\nIt was discovered that certain PHP grapheme functions incorrectly handled\nnegative offsets. A remote attacker could possibly use this issue to cause\nPHP to crash, resulting in a denial of service. (CVE-2016-4540,\nCVE-2016-4541)\n\nIt was discovered that PHP incorrectly handled certain malformed EXIF tags.\nA remote attacker could possibly use this issue to cause PHP to crash,\nresulting in a denial of service. (CVE-2016-4542, CVE-2016-4543,\nCVE-2016-4544)\n","modified":"2026-04-22T09:24:52.285169Z","published":"2016-05-24T17:31:16Z","related":["UBUNTU-CVE-2015-8865","UBUNTU-CVE-2016-3078","UBUNTU-CVE-2016-3132","UBUNTU-CVE-2016-4070","UBUNTU-CVE-2016-4071","UBUNTU-CVE-2016-4072","UBUNTU-CVE-2016-4073","UBUNTU-CVE-2016-4342","UBUNTU-CVE-2016-4343","UBUNTU-CVE-2016-4537","UBUNTU-CVE-2016-4538","UBUNTU-CVE-2016-4539","UBUNTU-CVE-2016-4540","UBUNTU-CVE-2016-4541","UBUNTU-CVE-2016-4542","UBUNTU-CVE-2016-4543","UBUNTU-CVE-2016-4544"],"upstream":["CVE-2015-8865","CVE-2016-3078","CVE-2016-3132","CVE-2016-4070","CVE-2016-4071","CVE-2016-4072","CVE-2016-4073","CVE-2016-4342","CVE-2016-4343","CVE-2016-4537","CVE-2016-4538","CVE-2016-4539","CVE-2016-4540","CVE-2016-4541","CVE-2016-4542","CVE-2016-4543","CVE-2016-4544","UBUNTU-CVE-2015-8865","UBUNTU-CVE-2016-3078","UBUNTU-CVE-2016-3132","UBUNTU-CVE-2016-4070","UBUNTU-CVE-2016-4071","UBUNTU-CVE-2016-4072","UBUNTU-CVE-2016-4073","UBUNTU-CVE-2016-4342","UBUNTU-CVE-2016-4343","UBUNTU-CVE-2016-4537","UBUNTU-CVE-2016-4538","UBUNTU-CVE-2016-4539","UBUNTU-CVE-2016-4540","UBUNTU-CVE-2016-4541","UBUNTU-CVE-2016-4542","UBUNTU-CVE-2016-4543","UBUNTU-CVE-2016-4544"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2984-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8865"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3078"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4070"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4071"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4072"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4073"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4342"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4343"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4537"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4539"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4540"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4541"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4542"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4543"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4544"}],"affected":[{"package":{"name":"php5","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.17?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.9+dfsg-1ubuntu4.17"}]}],"versions":["5.5.3+dfsg-1ubuntu2","5.5.3+dfsg-1ubuntu3","5.5.6+dfsg-1ubuntu1","5.5.6+dfsg-1ubuntu2","5.5.8+dfsg-2ubuntu1","5.5.9+dfsg-1ubuntu1","5.5.9+dfsg-1ubuntu2","5.5.9+dfsg-1ubuntu3","5.5.9+dfsg-1ubuntu4","5.5.9+dfsg-1ubuntu4.1","5.5.9+dfsg-1ubuntu4.2","5.5.9+dfsg-1ubuntu4.3","5.5.9+dfsg-1ubuntu4.4","5.5.9+dfsg-1ubuntu4.5","5.5.9+dfsg-1ubuntu4.6","5.5.9+dfsg-1ubuntu4.7","5.5.9+dfsg-1ubuntu4.9","5.5.9+dfsg-1ubuntu4.11","5.5.9+dfsg-1ubuntu4.12","5.5.9+dfsg-1ubuntu4.13","5.5.9+dfsg-1ubuntu4.14","5.5.9+dfsg-1ubuntu4.16"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libapache2-mod-php5","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"libapache2-mod-php5filter","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"libphp5-embed","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php-pear","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-cgi","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-cli","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-common","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-curl","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-enchant","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-fpm","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-gd","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-gmp","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-intl","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-ldap","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-mysql","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-mysqlnd","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-odbc","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-pgsql","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-pspell","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-readline","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-recode","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-snmp","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-sqlite","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-sybase","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-tidy","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-xmlrpc","binary_version":"5.5.9+dfsg-1ubuntu4.17"},{"binary_name":"php5-xsl","binary_version":"5.5.9+dfsg-1ubuntu4.17"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4342"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4343"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4537"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4538"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4539"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4540"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4541"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4542"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4543"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4544"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2984-1.json"}},{"package":{"name":"php7.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/php7.0@7.0.4-7ubuntu2.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.4-7ubuntu2.1"}]}],"versions":["7.0.1-5","7.0.1-6","7.0.2-1","7.0.2-3","7.0.2-4","7.0.2-5","7.0.3-2","7.0.3-3","7.0.3-9ubuntu1","7.0.4-5ubuntu1","7.0.4-5ubuntu2","7.0.4-7ubuntu1","7.0.4-7ubuntu2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libapache2-mod-php7.0","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"libphp7.0-embed","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-bcmath","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-bz2","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-cgi","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-cli","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-common","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-curl","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-enchant","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-fpm","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-gd","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-gmp","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-imap","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-interbase","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-intl","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-json","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-ldap","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-mbstring","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-mcrypt","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-mysql","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-odbc","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-opcache","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-pgsql","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-phpdbg","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-pspell","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-readline","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-recode","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-snmp","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-soap","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-sqlite3","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-sybase","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-tidy","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-xml","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-xmlrpc","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-xsl","binary_version":"7.0.4-7ubuntu2.1"},{"binary_name":"php7.0-zip","binary_version":"7.0.4-7ubuntu2.1"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2015-8865"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-3078"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-3132"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4070"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4071"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4072"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4073"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4537"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4538"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-4539"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4540"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4541"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4542"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4543"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-4544"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2984-1.json"}}],"schema_version":"1.7.5"}