English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50476
Category:Ubuntu Local Security Checks
Title:Ubuntu 4.10 USN-40-1 (php4)
Summary:Ubuntu 4.10 USN-40-1 (php4)
Description:
The remote host is missing an update to php4
announced via advisory USN-40-1.

Stefan Esser reported several buffer overflows in PHP's variable unserializing
handling. These could allow an attacker to execute arbitrary code on the server
with the PHP interpreter's privileges by sending specially crafted input
strings (form data, cookie values, and similar).

Additionally, Ilia Alshanetsky discovered a buffer overflow in the
exif_read_data() function. Attackers could execute arbitrary code on the server
by sending a JPEG image with a very long 'sectionname' value to PHP
applications that support image uploads.

The following packages are affected:

libapache2-mod-php4
php4
php4-cgi

Solution:
The problem can be corrected by upgrading the affected package to
version 4:4.3.8-3ubuntu7.1. After performing a standard system upgrade
you need to reload the PHP module in the webserver by executing

sudo /etc/init.d/apache2 reload

to effect the necessary changes.
http://lists.ubuntu.com/archives/ubuntu-security-announce/2004-December/000042.html

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1019
Bugtraq: 20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5 (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110314318531298&w=2
http://www.hardened-php.net/advisories/012004.txt
https://bugzilla.fedora.us/show_bug.cgi?id=2344
HPdes Security Advisory: HPSBMA01212
http://www.securityfocus.com/advisories/9028
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
http://www.redhat.com/support/errata/RHSA-2004-687.html
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
SuSE Security Announcement: SUSE-SA:2005:002 (Google Search)
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10511
XForce ISS Database: php-unserialize-code-execution(18514)
http://xforce.iss.net/xforce/xfdb/18514
Common Vulnerability Exposure (CVE) ID: CVE-2004-1065
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10877
XForce ISS Database: php-exifreaddata-bo(18517)
http://xforce.iss.net/xforce/xfdb/18517
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.