
CVE-2015-8874 – gd: gdImageFillToBorder deep recursion leading to stack overflow
https://notcve.org/view.php?id=CVE-2015-8874
16 May 2016 — Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call. Vulnerabilidad de consumo de pila en GD en PHP en versiones anteriores a 5.6.12 permite a atacantes remotos provocar una denegación de servicio a través de una llamada imagefilltoborder manipulada. It was discovered that the GD library incorrectly handled certain color tables in XPM images. If a user or automated system were tricked into processing a specially... • http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-674: Uncontrolled Recursion •

CVE-2015-8865 – file: Buffer over-write in finfo_open with malformed magic file
https://notcve.org/view.php?id=CVE-2015-8865
28 Apr 2016 — The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. La función file_check_mem en funcs.c en file en versiones anteriores a 5.23, cómo se utiliza en el componente Fileinfo en PHP en versiones anteri... • http://bugs.gw.com/view.php?id=522 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2016-4070 – php: Integer overflow in php_raw_url_encode
https://notcve.org/view.php?id=CVE-2016-4070
28 Apr 2016 — Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not). ** EN DISPUTA ** Desbordamiento de entero en la función php_raw_url_encode en ext/styard/url.c en PHP en versiones anteriores a 5.5.34, 5.6.x en versiones anteriores a 5... • http://lists.apple.com/archives/security-announce/2016/May/msg00004.html • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •

CVE-2014-9767 – php: ZipArchive:: extractTo allows for directory traversal when creating directories
https://notcve.org/view.php?id=CVE-2014-9767
21 Apr 2016 — Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive. Vulnerabilidad de salto de directorio en la función ZipArchive::extractTo en ext/zip/php_zip.c en PHP en versiones anteriores a 5.4.45, 5.5.x en versiones anteriores a 5.5.29 y 5.6.x en versiones anteriores a 5.6.13 y... • http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2015-8835 – php: type confusion issue in Soap Client call() method
https://notcve.org/view.php?id=CVE-2015-8835
21 Apr 2016 — The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c. La función make_http_soap_request en ext/soap/php_htt... • http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2015-8838 – Ubuntu Security Notice USN-2952-2
https://notcve.org/view.php?id=CVE-2015-8838
21 Apr 2016 — ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. ext/mysqlnd/mysqlnd.c en PHP en versiones anteriores a 5.4.43, 5.5.x en versiones anteriores 5.5.27 y 5.6.x en versiones anteriores a 5.6.11 usa una opción de cliente SSL para indicar que el SSL es opcional, lo que permite a atacantes man-in-... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=97aa752fee61fccdec361279adbfb17a3c60f3f4 • CWE-284: Improper Access Control •

CVE-2016-3185 – Ubuntu Security Notice USN-2952-1
https://notcve.org/view.php?id=CVE-2016-3185
21 Apr 2016 — The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c. La función make_http_soap_request en ext/soap/php_http.c en PHP en versiones anteriores a 5.5.44, 5.5.x en versiones anterior... • http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html • CWE-20: Improper Input Validation •

CVE-2016-2554 – php: buffer overflow in handling of long link names in tar phar archives
https://notcve.org/view.php?id=CVE-2016-2554
21 Apr 2016 — Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive. Desbordamiento de buffer basado en pila en ext/phar/tar.c en PHP en versiones anteriores a 5.5.32, 5.6.x en versiones anteriores a 5.6.18 y 7.x en versiones anteriores a 7.0.3 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación... • http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2016-3167
https://notcve.org/view.php?id=CVE-2016-3167
12 Apr 2016 — Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the "destination" parameter. Vulnerabilidad de redirección abierta en la función drupal_goto en Drupal 6.x en versiones anteriores a 6.38, cuando se utiliza con PHP en versiones anteriores a 5.4.7, permite a atacantes remotos redirigir a usuarios a sitios web arbitrarios y ... • http://www.debian.org/security/2016/dsa-3498 •

CVE-2016-3171
https://notcve.org/view.php?id=CVE-2016-3171
12 Apr 2016 — Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation. Drupal 6.x en versiones anteriores a 6.38, cuando se utiliza con PHP en versiones anteriores a 5.4.45, 5.5.x en versiones anteriores a 5.5.29 o 5.6.x en versiones anteriores a 5.6.13, podría permitir a atacantes remotos ejecutar código arbitrario a través de vectores relacionados con el truncado de datos ... • http://www.debian.org/security/2016/dsa-3498 • CWE-19: Data Processing Errors •