Bug 1022257 - (CVE-2016-10160) VUL-0: CVE-2016-10160: php: ext/phar/phar.c :: phar_parse_pharfile off-by-one error via crafted PHAR archives with an alias mismatch
(CVE-2016-10160)
VUL-0: CVE-2016-10160: php: ext/phar/phar.c :: phar_parse_pharfile off-by-one...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/179090/
CVSSv2:SUSE:CVE-2016-10160:7.5:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-01-27 12:17 UTC by Andreas Stieger
Modified: 2017-07-11 14:47 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2017-01-27 12:17:38 UTC
Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP
before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial
of service (memory corruption) or possibly execute arbitrary code via a crafted
PHAR archive with an alias mismatch.

QA reproducer submitted as test in
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10160
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10160.html
http://www.cvedetails.com/cve/CVE-2016-10160/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://bugs.php.net/bug.php?id=73768
http://www.securityfocus.com/bid/95783
Comment 1 Andreas Stieger 2017-01-27 12:17:55 UTC
From 5.3
Comment 2 Swamp Workflow Management 2017-01-27 23:00:37 UTC
bugbot adjusting priority
Comment 3 Petr Gajdos 2017-02-01 10:55:56 UTC
BEFORE

12/php7, 12/php5

$ USE_ZEND_ALLOC=0 php test.php
[...]
Aborted (core dumped)
$

11sp3/php53

$ php test.php         
zend_mm_heap corrupted
$

AFTER

all php

$ USE_ZEND_ALLOC=0 php test.php
cannot load phar "/022257/bug73768.phar" with implicit alias "" under different alias "alias.phar"
$
Comment 4 Petr Gajdos 2017-02-01 11:03:10 UTC
I believe all fixed.
Comment 7 Swamp Workflow Management 2017-02-22 14:09:39 UTC
SUSE-SU-2017:0534-1: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265
CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    php7-7.0.7-35.1
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    php7-7.0.7-35.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php7-7.0.7-35.1
Comment 8 Swamp Workflow Management 2017-02-23 14:08:56 UTC
SUSE-SU-2017:0556-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265
CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    php5-5.5.14-96.1
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    php5-5.5.14-96.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php5-5.5.14-96.1
Comment 9 Swamp Workflow Management 2017-02-27 17:09:30 UTC
SUSE-SU-2017:0568-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1019550,1022219,1022255,1022257,1022260,1022263,1022264,1022265
CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478
Sources used:
SUSE OpenStack Cloud 5 (src):    php53-5.3.17-101.1
SUSE Manager Proxy 2.1 (src):    php53-5.3.17-101.1
SUSE Manager 2.1 (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Server 11-SP4 (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    php53-5.3.17-101.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    php53-5.3.17-101.1
Comment 10 Swamp Workflow Management 2017-03-02 14:13:20 UTC
openSUSE-SU-2017:0588-1: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1008026,1019547,1019550,1019568,1019570,1022219,1022255,1022257,1022260,1022262,1022263,1022264,1022265
CVE References: CVE-2016-10158,CVE-2016-10159,CVE-2016-10160,CVE-2016-10161,CVE-2016-10162,CVE-2016-10166,CVE-2016-10167,CVE-2016-10168,CVE-2016-7478,CVE-2016-7479,CVE-2016-7480,CVE-2016-9138,CVE-2017-5340
Sources used:
openSUSE Leap 42.2 (src):    php7-7.0.7-12.1
Comment 11 Matthias Gerstner 2017-03-06 10:12:01 UTC
All affected codestreams released. openSUSE comes from SLE. Closing.