|
|||
Rule General Information |
---|
Release Date: | 2019-06-25 | |
Rule Name: | PHP tar Zero Length File Name Integer Overflow Vulnerability (CVE-2015-4021) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive. | |
Impact: | An attacker can exploit the affected software with a integer overflow vulnerability. Successful exploit leads to execute arbitrary code, and failed exploit may disturb the software logic and cause denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:74700 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://php.net/ChangeLog-5.php |