The following flaw was found in PHP: A memory leak flaw was found in PHP's exif_process_IFD_in_TIFF(). An attacker can leak address and then use it to bypass some protection such as PIE, ASLR, etc. Upstream bug: https://bugs.php.net/bug.php?id=72627 Upstream patch: https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
Analysis: Flaw is a result of a lack of validation when offset data is used from a TIFF image to read from the input stream. This may result in a OOB read. You need an attacker controlled malicious tiff image, which needs to be processed by exif_read_data() to trigger this flaw.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2016:2750 https://rhn.redhat.com/errata/RHSA-2016-2750.html