Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2015.0040
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2015-0040)
Zusammenfassung:The remote host is missing an update for the 'libgd, php, php-apc' package(s) announced via the MGASA-2015-0040 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'libgd, php, php-apc' package(s) announced via the MGASA-2015-0040 advisory.

Vulnerability Insight:
Updated php and libgd packages fix security vulnerabilities:

Double free vulnerability in the zend_ts_hash_graceful_destroy function in
zend_ts_hash.c in the Zend Engine in PHP before 5.5.21 allows remote
attackers to cause a denial of service or possibly have unspecified other
impact via unknown vectors (CVE-2014-9425).

sapi/cgi/cgi_main.c in the CGI component in PHP before 5.5.21, when mmap is
used to read a .php file, does not properly consider the mapping's length
during processing of an invalid file that begins with a # character and lacks
a newline character, which causes an out-of-bounds read and might allow remote
attackers to obtain sensitive information from php-cgi process memory by
leveraging the ability to upload a .php file or trigger unexpected code
execution if a valid PHP script is present in memory locations adjacent to the
mapping (CVE-2014-9427).

Use after free vulnerability in unserialize() in PHP before 5.5.21
(CVE-2015-0231).

Free called on an uninitialized pointer in php-exif in PHP before 5.5.21
(CVE-2015-0232).

The readelf.c source file has been removed from PHP's bundled copy of file's
libmagic, eliminating exposure to denial of service issues in ELF file parsing
such as CVE-2014-8116, CVE-2014-8117, CVE-2014-9620 and CVE-2014-9621 in PHP's
fileinfo module.

A buffer read overflow in gd_gif_in.c in the php#68601 bug referenced in the
PHP 5.5.21 ChangeLog has been fixed in the libgd package.

The php package has been updated to version 5.5.21 to fix these issues and
other bugs. Please see the upstream ChangeLog for more information.

Affected Software/OS:
'libgd, php, php-apc' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-8116
BugTraq ID: 71700
http://www.securityfocus.com/bid/71700
FreeBSD Security Advisory: FreeBSD-SA-14:28
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc
http://seclists.org/oss-sec/2014/q4/1056
RedHat Security Advisories: RHSA-2016:0760
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.securitytracker.com/id/1031344
http://secunia.com/advisories/61944
http://secunia.com/advisories/62081
http://www.ubuntu.com/usn/USN-2494-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-8117
BugTraq ID: 71692
http://www.securityfocus.com/bid/71692
http://www.ubuntu.com/usn/USN-2535-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-9425
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
BugTraq ID: 71800
http://www.securityfocus.com/bid/71800
https://security.gentoo.org/glsa/201503-03
http://openwall.com/lists/oss-security/2014/12/29/6
RedHat Security Advisories: RHSA-2015:1218
http://rhn.redhat.com/errata/RHSA-2015-1218.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-9427
BugTraq ID: 71833
http://www.securityfocus.com/bid/71833
HPdes Security Advisory: HPSBMU03380
http://marc.info/?l=bugtraq&m=143748090628601&w=2
HPdes Security Advisory: HPSBMU03409
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2015:032
http://openwall.com/lists/oss-security/2014/12/31/6
http://openwall.com/lists/oss-security/2015/01/01/1
http://openwall.com/lists/oss-security/2015/01/03/4
RedHat Security Advisories: RHSA-2015:1053
http://rhn.redhat.com/errata/RHSA-2015-1053.html
RedHat Security Advisories: RHSA-2015:1066
http://rhn.redhat.com/errata/RHSA-2015-1066.html
SuSE Security Announcement: SUSE-SU-2015:0365 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
SuSE Security Announcement: openSUSE-SU-2015:0325 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-9620
BugTraq ID: 71715
http://www.securityfocus.com/bid/71715
Debian Security Information: DSA-3121 (Google Search)
http://www.debian.org/security/2015/dsa-3121
https://security.gentoo.org/glsa/201503-08
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://www.openwall.com/lists/oss-security/2015/01/17/9
https://usn.ubuntu.com/3686-1/
Common Vulnerability Exposure (CVE) ID: CVE-2014-9621
http://mx.gw.com/pipermail/file/2014/001654.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-0231
BugTraq ID: 72539
http://www.securityfocus.com/bid/72539
Debian Security Information: DSA-3195 (Google Search)
http://www.debian.org/security/2015/dsa-3195
https://security.gentoo.org/glsa/201606-10
HPdes Security Advisory: HPSBUX03337
http://marc.info/?l=bugtraq&m=143403519711434&w=2
HPdes Security Advisory: SSRT102066
http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
RedHat Security Advisories: RHSA-2015:1135
http://rhn.redhat.com/errata/RHSA-2015-1135.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-0232
BugTraq ID: 72541
http://www.securityfocus.com/bid/72541
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.