Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Amazon Linux: Security Advisory (ALAS-2016-707)

Information

Severity

Severity

High

Family

Family

Amazon Linux Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

2 years ago

Summary

The remote host is missing an update announced via the referenced Security Advisory.

Insight

Insight

The following security-related issues were resolved: - Out-of-bounds read in imagescale (CVE-2013-7456) - Integer underflow causing arbitrary null write in fread/gzread (CVE-2016-5096) - The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive. (CVE-2016-4343) - Integer overflow in php_html_entities() (CVE-2016-5094) - Integer overflow in php_filter_full_special_chars() (CVE-2016-5095) - Out-of-bounds heap read in get_icu_value_internal (CVE-2016-5093) (Updated 2016-06-15: CVE-2016-5095 was fixed in this version, but was not previously listed in this errata.)

Solution

Solution

Run yum update php55 to update your system.