English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 76783 CVE Beschreibungen
und 40246 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55857
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200511-08 (PHP)
Zusammenfassung:Gentoo Security Advisory GLSA 200511-08 (PHP)
Beschreibung:The remote host is missing updates announced in
advisory GLSA 200511-08.

PHP suffers from multiple issues, resulting in security functions bypass,
local Denial of service, cross-site scripting or PHP variables overwrite.

Solution:
All PHP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose dev-php/php

All mod_php users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose dev-php/mod_php

All php-cgi users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose dev-php/php-cgi

http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200511-08
http://bugs.gentoo.org/show_bug.cgi?id=107602
http://bugs.gentoo.org/show_bug.cgi?id=111032
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-3054
http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:213
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
http://www.ubuntulinux.org/support/documentation/usn/usn-207-1
BugTraq ID: 14957
http://www.securityfocus.com/bid/14957
http://www.vupen.com/english/advisories/2005/1862
http://www.vupen.com/english/advisories/2005/2254
http://secunia.com/advisories/17371
http://secunia.com/advisories/17229
http://secunia.com/advisories/17510
http://secunia.com/advisories/17557
Common Vulnerability Exposure (CVE) ID: CVE-2005-3319
Bugtraq: 20051024 php < 4.4.1 htaccess apache dos (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=113019286208204&w=2
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0491.html
http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html
HPdes Security Advisory: HPSBMA02159
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522
HPdes Security Advisory: SSRT061238
http://www.ubuntulinux.org/usn/usn-232-1/document_view
Cert/CC Advisory: TA06-062A
http://www.us-cert.gov/cas/techalerts/TA06-062A.html
BugTraq ID: 15177
http://www.securityfocus.com/bid/15177
BugTraq ID: 16907
http://www.securityfocus.com/bid/16907
http://www.vupen.com/english/advisories/2006/0791
http://www.vupen.com/english/advisories/2006/4320
http://www.osvdb.org/20491
http://secunia.com/advisories/18198
http://secunia.com/advisories/19064
http://secunia.com/advisories/22691
http://securityreason.com/securityalert/525
XForce ISS Database: php-htaccess-dos(22844)
http://xforce.iss.net/xforce/xfdb/22844
Common Vulnerability Exposure (CVE) ID: CVE-2005-3388
Bugtraq: 20051031 Advisory 18/2005: PHP Cross Site Scripting (XSS) Vulnerability in phpinfo() (Google Search)
http://www.securityfocus.com/archive/1/archive/1/415292
http://www.hardened-php.net/advisory_182005.77.html
http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html
http://www.openpkg.org/security/OpenPKG-SA-2005.027-php.html
http://www.redhat.com/support/errata/RHSA-2005-831.html
http://www.redhat.com/support/errata/RHSA-2005-838.html
RedHat Security Advisories: RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
SuSE Security Announcement: SUSE-SR:2005:026 (Google Search)
SuSE Security Announcement: SUSE-SR:2005:027 (Google Search)
http://www.novell.com/linux/security/advisories/2005_27_sr.html
TurboLinux Advisory: TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
BugTraq ID: 15248
http://www.securityfocus.com/bid/15248
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10542
http://securitytracker.com/id?1015130
http://secunia.com/advisories/17559
http://secunia.com/advisories/17490
http://secunia.com/advisories/17531
http://secunia.com/advisories/18669
http://secunia.com/advisories/21252
http://securityreason.com/securityalert/133
Common Vulnerability Exposure (CVE) ID: CVE-2005-3389
Bugtraq: 20051031 Advisory 19/2005: PHP register_globals Activation Vulnerability in parse_str() (Google Search)
http://www.securityfocus.com/archive/1/415291
http://www.hardened-php.net/advisory_192005.78.html
SuSE Security Announcement: SUSE-SA:2005:069 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/419504/100/0/threaded
BugTraq ID: 15249
http://www.securityfocus.com/bid/15249
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11481
http://securitytracker.com/id?1015131
http://secunia.com/advisories/18054
http://securityreason.com/securityalert/134
Common Vulnerability Exposure (CVE) ID: CVE-2005-3390
Bugtraq: 20051031 Advisory 20/2005: PHP File-Upload $GLOBALS Overwrite Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/415290/30/0/threaded
http://www.hardened-php.net/advisory_202005.79.html
http://www.hardened-php.net/globals-problem
BugTraq ID: 15250
http://www.securityfocus.com/bid/15250
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10537
http://securitytracker.com/id?1015129
http://securityreason.com/securityalert/132
Common Vulnerability Exposure (CVE) ID: CVE-2005-3391
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:035
BugTraq ID: 15411
http://www.securityfocus.com/bid/15411
http://www.osvdb.org/20898
http://secunia.com/advisories/18763
Common Vulnerability Exposure (CVE) ID: CVE-2005-3392
BugTraq ID: 15413
http://www.securityfocus.com/bid/15413
http://www.osvdb.org/20897
XForce ISS Database: php-virtual-bypass-security(22924)
http://xforce.iss.net/xforce/xfdb/22924
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 40246 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.