Description: | Description:
The remote host is missing updates announced in advisory RHSA-2006:0276.
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.
The phpinfo() PHP function did not properly sanitize long strings. An attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo(). (CVE-2006-0996)
The html_entity_decode() PHP function was found to not be binary safe. An attacker could use this flaw to disclose a certain part of the memory. In order for this issue to be exploitable the target site would need to have a PHP script which called the html_entity_decode() function with untrusted input from the user and displayed the result. (CVE-2006-1490)
The error handling output was found to not properly escape HTML output in certain cases. An attacker could use this flaw to perform cross-site scripting attacks against sites where both display_errors and html_errors are enabled. (CVE-2006-0208)
An input validation error was found in the mb_send_mail() function. An attacker could use this flaw to inject arbitrary headers in a mail sent via a script calling the mb_send_mail() function where the To parameter can be controlled by the attacker. (CVE-2005-3883)
A buffer overflow flaw was discovered in uw-imap, the University of Washington's IMAP Server. php-imap is compiled against the static c-client libraries from imap and therefore needed to be recompiled against the fixed version. This issue only affected Red Hat Enterprise Linux 3. (CVE-2005-2933).
Users of PHP should upgrade to these updated packages, which contain backported patches that resolve these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2006-0276.html http://www.redhat.com/security/updates/classification/#moderate
Risk factor : High
CVSS Score: 7.5
|