{"id":"USN-2984-1","summary":"php5, php7.0 vulnerabilities","details":"It was discovered that the PHP Fileinfo component incorrectly handled\ncertain magic files. An attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865)\n\nHans Jerry Illikainen discovered that the PHP Zip extension incorrectly\nhandled certain malformed Zip archives. A remote attacker could use this\nissue to cause PHP to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 16.04 LTS.\n(CVE-2016-3078)\n\nIt was discovered that PHP incorrectly handled invalid indexes in the\nSplDoublyLinkedList class. An attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132)\n\nIt was discovered that the PHP rawurlencode() function incorrectly handled\nlarge strings. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n16.04 LTS. (CVE-2016-4070)\n\nIt was discovered that the PHP php_snmp_error() function incorrectly\nhandled string formatting. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071)\n\nIt was discovered that the PHP phar extension incorrectly handled certain\nfilenames in archives. A remote attacker could use this issue to cause PHP\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4072)\n\nIt was discovered that the PHP mb_strcut() function incorrectly handled\nstring formatting. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073)\n\nIt was discovered that the PHP phar extension incorrectly handled certain\narchive files. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and\nUbuntu 15.10. (CVE-2016-4342, CVE-2016-4343)\n\nIt was discovered that the PHP bcpowmod() function incorrectly handled\nmemory. A remote attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly execute arbitrary code. \n(CVE-2016-4537, CVE-2016-4538)\n\nIt was discovered that the PHP XML parser incorrectly handled certain\nmalformed XML data. A remote attacker could possibly use this issue to\ncause PHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-4539)\n\nIt was discovered that certain PHP grapheme functions incorrectly handled\nnegative offsets. A remote attacker could possibly use this issue to cause\nPHP to crash, resulting in a denial of service. (CVE-2016-4540,\nCVE-2016-4541)\n\nIt was discovered that PHP incorrectly handled certain malformed EXIF tags.\nA remote attacker could possibly use this issue to cause PHP to crash,\nresulting in a denial of service. (CVE-2016-4542, CVE-2016-4543,\nCVE-2016-4544)\n","modified":"2026-02-10T04:40:59Z","published":"2016-05-24T17:31:16Z","related":["UBUNTU-CVE-2015-8865","UBUNTU-CVE-2016-3078","UBUNTU-CVE-2016-3132","UBUNTU-CVE-2016-4070","UBUNTU-CVE-2016-4071","UBUNTU-CVE-2016-4072","UBUNTU-CVE-2016-4073","UBUNTU-CVE-2016-4342","UBUNTU-CVE-2016-4343","UBUNTU-CVE-2016-4537","UBUNTU-CVE-2016-4538","UBUNTU-CVE-2016-4539","UBUNTU-CVE-2016-4540","UBUNTU-CVE-2016-4541","UBUNTU-CVE-2016-4542","UBUNTU-CVE-2016-4543","UBUNTU-CVE-2016-4544"],"upstream":["CVE-2015-8865","CVE-2016-3078","CVE-2016-3132","CVE-2016-4070","CVE-2016-4071","CVE-2016-4072","CVE-2016-4073","CVE-2016-4342","CVE-2016-4343","CVE-2016-4537","CVE-2016-4538","CVE-2016-4539","CVE-2016-4540","CVE-2016-4541","CVE-2016-4542","CVE-2016-4543","CVE-2016-4544","UBUNTU-CVE-2015-8865","UBUNTU-CVE-2016-3078","UBUNTU-CVE-2016-3132","UBUNTU-CVE-2016-4070","UBUNTU-CVE-2016-4071","UBUNTU-CVE-2016-4072","UBUNTU-CVE-2016-4073","UBUNTU-CVE-2016-4342","UBUNTU-CVE-2016-4343","UBUNTU-CVE-2016-4537","UBUNTU-CVE-2016-4538","UBUNTU-CVE-2016-4539","UBUNTU-CVE-2016-4540","UBUNTU-CVE-2016-4541","UBUNTU-CVE-2016-4542","UBUNTU-CVE-2016-4543","UBUNTU-CVE-2016-4544"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2984-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8865"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3078"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4070"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4071"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4072"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4073"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4342"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4343"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4537"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4539"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4540"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4541"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4542"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4543"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4544"}],"affected":[{"package":{"name":"php5","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.17?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.9+dfsg-1ubuntu4.17"}]}],"versions":["5.5.3+dfsg-1ubuntu2","5.5.3+dfsg-1ubuntu3","5.5.6+dfsg-1ubuntu1","5.5.6+dfsg-1ubuntu2","5.5.8+dfsg-2ubuntu1","5.5.9+dfsg-1ubuntu1","5.5.9+dfsg-1ubuntu2","5.5.9+dfsg-1ubuntu3","5.5.9+dfsg-1ubuntu4","5.5.9+dfsg-1ubuntu4.1","5.5.9+dfsg-1ubuntu4.2","5.5.9+dfsg-1ubuntu4.3","5.5.9+dfsg-1ubuntu4.4","5.5.9+dfsg-1ubuntu4.5","5.5.9+dfsg-1ubuntu4.6","5.5.9+dfsg-1ubuntu4.7","5.5.9+dfsg-1ubuntu4.9","5.5.9+dfsg-1ubuntu4.11","5.5.9+dfsg-1ubuntu4.12","5.5.9+dfsg-1ubuntu4.13","5.5.9+dfsg-1ubuntu4.14","5.5.9+dfsg-1ubuntu4.16"],"ecosystem_specific":{"binaries":[{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"libapache2-mod-php5"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"libapache2-mod-php5filter"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"libphp5-embed"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php-pear"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-cgi"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-cli"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-common"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-curl"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-dev"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-enchant"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-fpm"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-gd"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-gmp"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-intl"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-ldap"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-mysql"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-mysqlnd"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-odbc"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-pgsql"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-pspell"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-readline"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-recode"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-snmp"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-sqlite"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-sybase"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-tidy"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-xmlrpc"},{"binary_version":"5.5.9+dfsg-1ubuntu4.17","binary_name":"php5-xsl"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2984-1.json","cves_map":{"cves":[{"id":"CVE-2016-4342","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4343","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4537","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4538","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4539","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4540","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4541","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4542","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4543","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4544","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"php7.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/php7.0@7.0.4-7ubuntu2.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.4-7ubuntu2.1"}]}],"versions":["7.0.1-5","7.0.1-6","7.0.2-1","7.0.2-3","7.0.2-4","7.0.2-5","7.0.3-2","7.0.3-3","7.0.3-9ubuntu1","7.0.4-5ubuntu1","7.0.4-5ubuntu2","7.0.4-7ubuntu1","7.0.4-7ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"libapache2-mod-php7.0"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"libphp7.0-embed"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-bcmath"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-bz2"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-cgi"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-cli"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-common"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-curl"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-dev"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-enchant"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-fpm"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-gd"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-gmp"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-imap"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-interbase"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-intl"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-json"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-ldap"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-mbstring"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-mcrypt"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-mysql"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-odbc"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-opcache"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-pgsql"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-phpdbg"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-pspell"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-readline"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-recode"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-snmp"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-soap"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-sqlite3"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-sybase"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-tidy"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-xml"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-xmlrpc"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-xsl"},{"binary_version":"7.0.4-7ubuntu2.1","binary_name":"php7.0-zip"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2984-1.json","cves_map":{"cves":[{"id":"CVE-2015-8865","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-3078","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3132","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4070","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4071","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4072","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4073","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4537","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4538","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4539","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-4540","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4541","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4542","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4543","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-4544","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}