English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72151 CVE descriptions
and 38907 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56424
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-261-1 (php5)
Summary:Ubuntu USN-261-1 (php5)
Description:
The remote host is missing an update to php5
announced via advisory USN-261-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: libapache2-mod-php4 libapache2-mod-php5

Stefan Esser discovered that the 'session' module did not sufficiently
verify the validity of the user-supplied session ID. A remote attacker
could exploit this to insert arbitrary HTTP headers into the response
sent by the PHP application, which could lead to HTTP Response
Splitting (forging of arbitrary responses on behalf the PHP
application) and Cross Site Scripting (XSS) (execution of arbitrary
web script code in the client's browser) attacks. (CVE-2006-0207)

PHP applications were also vulnerable to several Cross Site Scripting
(XSS) flaws if the options 'display_errors' and 'html_errors' were
enabled. Please note that enabling 'html_errors' is not recommended
for production systems. (CVE-2006-0208)

Solution:
The problem can be corrected by upgrading the affected package to
version 4:4.3.8-3ubuntu7.15 (libapache2-mod-php4 for Ubuntu 4.10),
4:4.3.10-10ubuntu4.4 (libapache2-mod-php4 for Ubuntu 5.04), or
5.0.5-2ubuntu1.2 (libapache2-mod-php5 for Ubuntu 5.10). After a
standard system upgrade you need to restart Apache with

sudo apache2ctl restart

to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-261-1

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0207
Bugtraq: 20060112 Advisory 01/2006: PHP ext/session HTTP Response Splitting Vulnerability (Google Search)
http://www.hardened-php.net/advisory_012006.112.html
Debian Security Information: DSA-1331 (Google Search)
http://www.debian.org/security/2007/dsa-1331
http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:028
SuSE Security Announcement: SUSE-SR:2006:004 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
http://www.ubuntulinux.org/support/documentation/usn/usn-261-1
BugTraq ID: 16220
http://www.securityfocus.com/bid/16220
http://www.vupen.com/english/advisories/2006/0177
http://www.vupen.com/english/advisories/2006/0369
http://securitytracker.com/id?1015484
http://secunia.com/advisories/18431
http://secunia.com/advisories/18697
http://secunia.com/advisories/19179
http://secunia.com/advisories/19355
http://secunia.com/advisories/19012
http://secunia.com/advisories/25945
XForce ISS Database: php-session-response-splitting(24094)
http://xforce.iss.net/xforce/xfdb/24094
Common Vulnerability Exposure (CVE) ID: CVE-2006-0208
RedHat Security Advisories: RHSA-2006:0276
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
RedHat Security Advisories: RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
SGI Security Advisory: 20060501-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
BugTraq ID: 16803
http://www.securityfocus.com/bid/16803
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10064
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178028
http://www.vupen.com/english/advisories/2006/2685
http://secunia.com/advisories/19832
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
http://secunia.com/advisories/20210
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.