CVE-2016-5399
Publication date 22 July 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| php5 | 16.04 LTS xenial | Not in release |
| 14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.19
|
|
| php7.0 | 16.04 LTS xenial |
Fixed 7.0.8-0ubuntu0.16.04.2
|
| 14.04 LTS trusty | Not in release | |
Notes
seth-arnold
PHP position seems to suggest they'll fix bzread() to ensure it conforms to the documented behaviour but they won't take any steps to 'safe' an improper use of API by applications. Since the API was apparently not honoured before I don't know how an application could be expected to be correct.
Patch details
| Package | Patch details |
|---|---|
| php5 | |
| php7.0 |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3045-1
- PHP vulnerabilities
- 2 August 2016