Description
It was discovered that PHP incorrectly handled cleanup when used with
Apache 2.4. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
It was discovered that PHP incorrectly handled opening tar, zip or phar
archives through the PHAR extension. A remote attacker could use this issue
to cause PHP to crash, resulting in a denial of service, or possibly
execute arbitrary code.
It was discovered that PHP incorrectly handled regular expressions. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code.
Paulos Yibelo discovered that PHP incorrectly handled moving files when a
pathname contained a null character. A remote attacker could use this issue
to possibly bypass filename restrictions. This issue only applied to
Ubuntu 14.04 LTS and Ubuntu 14.10.
It was discovered that PHP incorrectly handled unserializing PHAR files. A
remote attacker could use this issue to cause PHP to possibly expose
sensitive information.
Taoguang Chen discovered that PHP incorrectly handled unserializing certain
objects. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.