
CVE-2016-4343 – php: Uninitialized pointer in phar_make_dirstream()
https://notcve.org/view.php?id=CVE-2016-4343
22 May 2016 — The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive. La función phar_make_dirstream en ext/phar/dirstream.c en PHP en versiones anteriores a 5.6.18 y 7.x en versiones anteriores a 7.0.3 no maneja correctamente archivos ././@LongLink de tamaño cero, lo que perm... • http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html • CWE-456: Missing Initialization of a Variable CWE-824: Access of Uninitialized Pointer •

CVE-2015-4116 – Ubuntu Security Notice USN-3045-1
https://notcve.org/view.php?id=CVE-2015-4116
16 May 2016 — Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation. Vulnerabilidad de uso después de liberación de memoria en la función spl_ptr_heap_insert en ext/spl/spl_heap.c en PHP en versiones anteriores a 5.5.27 y 5.6.x en versiones anteriores a 5.6.11 permite a atacantes remotos ejecutar código arbitrario desencadenando una operación ... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 •

CVE-2015-8873 – php: Stack consumption vulnerability in Zend/zend_exceptions.c
https://notcve.org/view.php?id=CVE-2015-8873
16 May 2016 — Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls. Vulnerabilidad de consumo de pila en Zend/zend_exceptions.c en PHP en versiones anteriores a 5.4.44, 5.5.x en versiones anteriores a 5.5.28 y 5.6.x en versiones anteriores a 5.6.12 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de llam... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=4d2278143a08b7522de9471d0f014d7357c28fea • CWE-20: Improper Input Validation CWE-674: Uncontrolled Recursion •

CVE-2014-0236
https://notcve.org/view.php?id=CVE-2014-0236
16 May 2016 — file before 5.18, as used in the Fileinfo component in PHP before 5.6.0, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a zero root_storage value in a CDF file, related to cdf.c and readcdf.c. file en versiones anteriores a 5.18, tal como se utiliza en el componente Fileinfo en PHP en versiones anteriores a 5.6.0, permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULO y caída de aplicación) a través de un valor ro... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=f3f22ff5c697aef854ffc1918bce708b37481b0f •

CVE-2015-8874 – gd: gdImageFillToBorder deep recursion leading to stack overflow
https://notcve.org/view.php?id=CVE-2015-8874
16 May 2016 — Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call. Vulnerabilidad de consumo de pila en GD en PHP en versiones anteriores a 5.6.12 permite a atacantes remotos provocar una denegación de servicio a través de una llamada imagefilltoborder manipulada. It was discovered that the GD library incorrectly handled certain color tables in XPM images. If a user or automated system were tricked into processing a specially... • http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-674: Uncontrolled Recursion •

CVE-2015-8865 – file: Buffer over-write in finfo_open with malformed magic file
https://notcve.org/view.php?id=CVE-2015-8865
28 Apr 2016 — The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file. La función file_check_mem en funcs.c en file en versiones anteriores a 5.23, cómo se utiliza en el componente Fileinfo en PHP en versiones anteri... • http://bugs.gw.com/view.php?id=522 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2016-4070 – php: Integer overflow in php_raw_url_encode
https://notcve.org/view.php?id=CVE-2016-4070
28 Apr 2016 — Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not). ** EN DISPUTA ** Desbordamiento de entero en la función php_raw_url_encode en ext/styard/url.c en PHP en versiones anteriores a 5.5.34, 5.6.x en versiones anteriores a 5... • http://lists.apple.com/archives/security-announce/2016/May/msg00004.html • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •

CVE-2016-4072 – php: Invalid memory write in phar on filename containing \0 inside name
https://notcve.org/view.php?id=CVE-2016-4072
28 Apr 2016 — The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c. La extensión Phar en PHP en versiones anteriores a 5.5.34, 5.6.x en versiones anteriores a 5.6.20 y 7.x en versiones anteriores a 7.0.5 permite a atacantes remotos ejecutar código arbitrario a través del nombre de un archivo manipulado, como se demuestr... • http://lists.apple.com/archives/security-announce/2016/May/msg00004.html • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •

CVE-2016-4073 – php: mb_strcut() Negative size parameter in memcpy
https://notcve.org/view.php?id=CVE-2016-4073
28 Apr 2016 — Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call. Múltiples desbordamientos de entero en la función mbfl_strcut en ext/mbstreng/libmbfl/mbfl/mbfilter.c en PHP en versiones anteriores a 5.5.34, 5.6.x en versiones anteriores a 5.6.20 y 7.x en versiones anteriores a 7.... • http://lists.apple.com/archives/security-announce/2016/May/msg00004.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •

CVE-2016-4071 – PHP 5.5.33/7.0.4 - SNMP Format String
https://notcve.org/view.php?id=CVE-2016-4071
28 Apr 2016 — Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call. Vulnerabilidad de formato de cadena en la función php_snmp_erro en ext/snmp/snmp.c en PHP en versiones anteriores a 5.5.34, 5.6.x en versiones anteriores a 5.6.20 y 7.x en versiones anteriores a 7.0.5 permite a atacantes remotos ejecutar código arbitrario a través de e... • https://www.exploit-db.com/exploits/39645 • CWE-20: Improper Input Validation CWE-134: Use of Externally-Controlled Format String •