Operating System:

[Debian]

Published:

11 December 2018

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3830
                          php7.0 security update
                             11 December 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php7.0
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account            
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19935 CVE-2018-19518 CVE-2018-17082
                   CVE-2018-14883 CVE-2018-14851 

Reference:         ESB-2018.3785
                   ESB-2018.3029

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4353

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4353-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 10, 2018                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : php7.0
CVE ID         : CVE-2018-14851 CVE-2018-14883 CVE-2018-17082
                 CVE-2018-19518 CVE-2018-19935

Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language: The EXIF module was susceptible to
denial of service/information disclosure when parsing malformed images,
the Apache module allowed cross-site-scripting via the body of a
"Transfer-Encoding: chunked" request and the IMAP extension performed
insufficient input validation which can result in the execution of
arbitrary shell commands in the imap_open() function and denial of
service in the imap_mail() function.

For the stable distribution (stretch), these problems have been fixed in
version 7.0.33-0+deb9u1.

We recommend that you upgrade your php7.0 packages.

For the detailed security status of php7.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=AGAh
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ctUE
-----END PGP SIGNATURE-----