CVE-2016-4544

NameCVE-2016-4544
DescriptionThe exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-499-1, DSA-3602-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5sourcewheezy5.4.45-0+deb7u3DLA-499-1
php5sourcejessie5.6.22+dfsg-0+deb8u1DSA-3602-1
php5source(unstable)5.6.21+dfsg-1
php7.0source(unstable)7.0.6-1

Notes

https://bugs.php.net/bug.php?id=72094
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
Fixed in 7.0.6, 5.6.21, 5.5.35
https://www.openwall.com/lists/oss-security/2016/05/05/21

Search for package or bug name: Reporting problems