English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 119323 CVE Beschreibungen
und 58880 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.835181
Kategorie:HP-UX Local Security Checks
Titel:HP-UX Update for Apache With PHP HPSBUX02332
Zusammenfassung:Check for the Version of Apache With PHP
Beschreibung:Description:


Vulnerability Insight:
Potential security vulnerabilities have been identified with HP-UX running
Apache with PHP. These vulnerabilities could be exploited remotely to create
a Denial of Service (DoS) or to gain extended privileges.

Impact:
Remote Denial of Service (DoS)
gain extended privileges.

Affected Software/OS:
Apache With PHP on
HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.18 with PHP v5.2.4 or
earlier.

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01438646-2

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-2872
Bugtraq: 20070601 SEC Consult SA-20070601-0 :: PHP chunk_split() integer overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/470244/100/0/threaded
http://www.sec-consult.com/291.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
HPdes Security Advisory: HPSBUX02308
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
HPdes Security Advisory: SSRT080010
HPdes Security Advisory: HPSBUX02332
http://www.securityfocus.com/archive/1/archive/1/491693/100/0/threaded
HPdes Security Advisory: SSRT080056
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RedHat Security Advisories: RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://www.redhat.com/support/errata/RHSA-2007-0888.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
SuSE Security Announcement: SUSE-SA:2007:044 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
SuSE Security Announcement: SUSE-SA:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://www.trustix.org/errata/2007/0023/
http://www.ubuntulinux.org/support/documentation/usn/usn-549-1
http://www.ubuntu.com/usn/usn-549-2
BugTraq ID: 24261
http://www.securityfocus.com/bid/24261
http://osvdb.org/36083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
http://www.vupen.com/english/advisories/2007/2061
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2008/0398
http://www.securitytracker.com/id?1018186
http://secunia.com/advisories/25535
http://secunia.com/advisories/25456
http://secunia.com/advisories/26048
http://secunia.com/advisories/26231
http://secunia.com/advisories/26838
http://secunia.com/advisories/26930
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26967
http://secunia.com/advisories/27037
http://secunia.com/advisories/27110
http://secunia.com/advisories/27351
http://secunia.com/advisories/27377
http://secunia.com/advisories/27545
http://secunia.com/advisories/27102
http://secunia.com/advisories/27864
http://secunia.com/advisories/28318
http://secunia.com/advisories/28658
http://secunia.com/advisories/28750
http://secunia.com/advisories/28936
http://secunia.com/advisories/30040
http://www.vupen.com/english/advisories/2008/0059
XForce ISS Database: php-chunksplit-security-bypass(39398)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
Common Vulnerability Exposure (CVE) ID: CVE-2007-3378
Bugtraq: 20070627 PHP 4/5 htaccess safemode and open_basedir Bypass (Google Search)
http://www.securityfocus.com/archive/1/archive/1/472343/100/0/threaded
http://securityreason.com/achievement_exploitalert/9
http://securityreason.com/achievement_securityalert/45
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://www.trustix.org/errata/2007/0026/
BugTraq ID: 24661
http://www.securityfocus.com/bid/24661
BugTraq ID: 25498
http://www.securityfocus.com/bid/25498
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056
http://www.vupen.com/english/advisories/2007/3023
http://www.vupen.com/english/advisories/2008/0924/references
http://www.osvdb.org/38682
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/27648
http://secunia.com/advisories/29420
http://securityreason.com/securityalert/2831
http://securityreason.com/securityalert/3389
XForce ISS Database: php-htaccess-security-bypass(35102)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
XForce ISS Database: php-sessionsavepath-errorlog-security-bypass(39403)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
Common Vulnerability Exposure (CVE) ID: CVE-2007-4783
Bugtraq: 20070905 PHP <=5.2.4 iconv_substr() denial of service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478637/100/0/threaded
http://osvdb.org/38917
http://secunia.com/advisories/27659
http://securityreason.com/securityalert/3115
Common Vulnerability Exposure (CVE) ID: CVE-2007-4840
Bugtraq: 20070906 PHP <= 5.2.4 multiple Iconv functions denial of service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478730/100/0/threaded
http://osvdb.org/38916
http://securityreason.com/securityalert/3122
Common Vulnerability Exposure (CVE) ID: CVE-2007-4887
Bugtraq: 20070910 /* PHP <=5.2.4 open_basedir bypass & code exec & denial of service errata ... working on windows too .. */ (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478988/100/0/threaded
Bugtraq: 20070910 PHP <=5.2.4 open_basedir bypass & code exec & denial of service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478985/100/0/threaded
BugTraq ID: 26403
http://www.securityfocus.com/bid/26403
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5767
http://www.vupen.com/english/advisories/2007/3825
http://securityreason.com/securityalert/3133
Common Vulnerability Exposure (CVE) ID: CVE-2007-5898
Debian Security Information: DSA-1444 (Google Search)
http://www.debian.org/security/2008/dsa-1444
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
http://www.redhat.com/support/errata/RHSA-2008-0505.html
http://www.redhat.com/support/errata/RHSA-2008-0544.html
http://www.redhat.com/support/errata/RHSA-2008-0545.html
http://www.redhat.com/support/errata/RHSA-2008-0546.html
http://www.redhat.com/support/errata/RHSA-2008-0582.html
http://www.ubuntu.com/usn/usn-628-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10080
http://securitytracker.com/id?1018934
http://secunia.com/advisories/28249
http://secunia.com/advisories/30828
http://secunia.com/advisories/31119
http://secunia.com/advisories/31124
http://secunia.com/advisories/31200
Common Vulnerability Exposure (CVE) ID: CVE-2007-5899
http://osvdb.org/38918
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11211
Common Vulnerability Exposure (CVE) ID: CVE-2007-5900
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 58880 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2018 E-Soft Inc. Alle Rechte vorbehalten.