Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2014.0162
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2014-0162)
Summary:The remote host is missing an update for the 'php, php-apc, php-gd-bundled, php-timezonedb' package(s) announced via the MGASA-2014-0162 advisory.
Description:Summary:
The remote host is missing an update for the 'php, php-apc, php-gd-bundled, php-timezonedb' package(s) announced via the MGASA-2014-0162 advisory.

Vulnerability Insight:
Updated php packages fix security vulnerabilities:

It was discovered that the file utility contains a flaw in the handling of
'indirect' magic rules in the libmagic library, which leads to an infinite
recursion when trying to determine the file type of certain files
(CVE-2014-1943).

A flaw was found in the way the file utility determined the type of Portable
Executable (PE) format files, the executable format used on Windows. A
malicious PE file could cause the file utility to crash or, potentially,
execute arbitrary code (CVE-2014-2270).

PHP contains a bundled copy of the file utility's libmagic library, so it was
vulnerable to these issues. It has been updated to version 5.4.26, which
fixes these issues and several other bugs.

This update also fixes a heap buffer over-read in DateInterval, which was
fixed in PHP 5.4.24 (CVE-2013-6712).

Also, the timezonedb PHP PECL module has been updated to its newest version.

Additionally, php-apc has been rebuilt against the updated php package.

Affected Software/OS:
'php, php-apc, php-gd-bundled, php-timezonedb' package(s) on Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-6712
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
Debian Security Information: DSA-2816 (Google Search)
http://www.debian.org/security/2013/dsa-2816
HPdes Security Advisory: HPSBMU03112
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322
HPdes Security Advisory: SSRT101447
https://bugs.php.net/bug.php?id=66060
RedHat Security Advisories: RHSA-2014:1765
http://rhn.redhat.com/errata/RHSA-2014-1765.html
SuSE Security Announcement: openSUSE-SU-2013:1963 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
SuSE Security Announcement: openSUSE-SU-2013:1964 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
http://www.ubuntu.com/usn/USN-2055-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-1943
Debian Security Information: DSA-2861 (Google Search)
http://www.debian.org/security/2014/dsa-2861
Debian Security Information: DSA-2868 (Google Search)
http://www.debian.org/security/2014/dsa-2868
http://mx.gw.com/pipermail/file/2014/001330.html
http://mx.gw.com/pipermail/file/2014/001334.html
http://mx.gw.com/pipermail/file/2014/001337.html
http://mx.gw.com/pipermail/file/2014/001327.html
SuSE Security Announcement: openSUSE-SU-2014:0364 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html
SuSE Security Announcement: openSUSE-SU-2014:0367 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html
http://www.ubuntu.com/usn/USN-2123-1
http://www.ubuntu.com/usn/USN-2126-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-2270
Debian Security Information: DSA-2873 (Google Search)
http://www.debian.org/security/2014/dsa-2873
https://security.gentoo.org/glsa/201503-08
http://seclists.org/oss-sec/2014/q1/473
http://seclists.org/oss-sec/2014/q1/504
http://seclists.org/oss-sec/2014/q1/505
SuSE Security Announcement: openSUSE-SU-2014:0435 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html
http://www.ubuntu.com/usn/USN-2162-1
http://www.ubuntu.com/usn/USN-2163-1
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.