English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58078
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2007:0081
Summary:Redhat Security Advisory RHSA-2007:0081
Description:
The remote host is missing updates announced in
advisory RHSA-2007:0081.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

A number of buffer overflow flaws were found in the PHP session extension

the str_replace() function
and the imap_mail_compose() function. If very
long strings were passed to the str_replace() function, an integer
overflow could occur in memory allocation. If a script used the
imap_mail_compose() function to create a new MIME message based on an
input body from an untrusted source, it could result in a heap overflow.
An attacker with access to a PHP application affected by any these issues
could trigger the flaws and possibly execute arbitrary code as the
'apache' user. (CVE-2007-0906)

When unserializing untrusted data on 64-bit platforms, the
zend_hash_init() function could be forced into an infinite loop, consuming
CPU resources for a limited time, until the script timeout alarm aborted
execution of the script. (CVE-2007-0988)

If the wddx extension was used to import WDDX data from an untrusted
source, certain WDDX input packets could expose a random portion of heap
memory. (CVE-2007-0908)

If the odbc_result_all() function was used to display data from a database,
and the database table contents were under an attacker's control, a format
string vulnerability was possible which could allow arbitrary code
execution. (CVE-2007-0909)

A one byte memory read always occurs before the beginning of a buffer. This
could be triggered, for example, by any use of the header() function in a
script. However it is unlikely that this would have any effect.
(CVE-2007-0907)

Several flaws in PHP could allow attackers to clobber certain
super-global variables via unspecified vectors. (CVE-2007-0910)

Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.

Red Hat would like to thank Stefan Esser for his help diagnosing these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0081.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0906
Bugtraq: 20070227 rPSA-2007-0043-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/archive/1/461462/100/0/threaded
Bugtraq: 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/archive/1/466166/100/0/threaded
Debian Security Information: DSA-1264 (Google Search)
http://www.us.debian.org/security/2007/dsa-1264
http://security.gentoo.org/glsa/glsa-200703-21.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:048
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
http://www.redhat.com/support/errata/RHSA-2007-0076.html
http://www.redhat.com/support/errata/RHSA-2007-0081.html
RedHat Security Advisories: RHSA-2007:0089
http://rhn.redhat.com/errata/RHSA-2007-0089.html
http://www.redhat.com/support/errata/RHSA-2007-0088.html
http://www.redhat.com/support/errata/RHSA-2007-0082.html
SGI Security Advisory: 20070201-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
SuSE Security Announcement: SUSE-SA:2007:020 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
SuSE Security Announcement: SUSE-SA:2007:044 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://www.trustix.org/errata/2007/0009/
http://www.ubuntu.com/usn/usn-424-1
http://www.ubuntu.com/usn/usn-424-2
BugTraq ID: 22496
http://www.securityfocus.com/bid/22496
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8992
http://www.vupen.com/english/advisories/2007/0546
http://www.osvdb.org/32776
http://osvdb.org/34706
http://osvdb.org/34707
http://osvdb.org/34708
http://osvdb.org/34709
http://osvdb.org/34710
http://osvdb.org/34711
http://osvdb.org/34712
http://osvdb.org/34713
http://osvdb.org/34714
http://osvdb.org/34715
http://www.securitytracker.com/id?1017671
http://secunia.com/advisories/24089
http://secunia.com/advisories/24195
http://secunia.com/advisories/24217
http://secunia.com/advisories/24248
http://secunia.com/advisories/24236
http://secunia.com/advisories/24295
http://secunia.com/advisories/24322
http://secunia.com/advisories/24432
http://secunia.com/advisories/24421
http://secunia.com/advisories/24514
http://secunia.com/advisories/24606
http://secunia.com/advisories/24642
http://secunia.com/advisories/24945
http://secunia.com/advisories/24284
http://secunia.com/advisories/24419
http://secunia.com/advisories/26048
Common Vulnerability Exposure (CVE) ID: CVE-2007-0907
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11321
http://osvdb.org/32767
Common Vulnerability Exposure (CVE) ID: CVE-2007-0908
http://www.php-security.org/MOPB/MOPB-11-2007.html
BugTraq ID: 22806
http://www.securityfocus.com/bid/22806
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11185
http://osvdb.org/32766
http://securityreason.com/securityalert/2321
XForce ISS Database: php-wddx-information-disclosure(32493)
http://xforce.iss.net/xforce/xfdb/32493
Common Vulnerability Exposure (CVE) ID: CVE-2007-0909
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9722
http://osvdb.org/32764
http://osvdb.org/32765
Common Vulnerability Exposure (CVE) ID: CVE-2007-0910
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9514
http://osvdb.org/32763
Common Vulnerability Exposure (CVE) ID: CVE-2007-0988
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858
http://www.php.net/releases/5_2_1.php
http://www.php-security.org/MOPB/MOPB-05-2007.html
HPdes Security Advisory: HPSBMA02215
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
HPdes Security Advisory: SSRT071423
HPdes Security Advisory: HPSBTU02232
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
HPdes Security Advisory: SSRT071429
SuSE Security Announcement: SUSE-SA:2007:032 (Google Search)
http://www.novell.com/linux/security/advisories/2007_32_php.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11092
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
http://osvdb.org/32762
http://secunia.com/advisories/25056
http://secunia.com/advisories/25423
http://secunia.com/advisories/25850
http://securityreason.com/securityalert/2315
XForce ISS Database: php-zendhashinit-dos(32709)
http://xforce.iss.net/xforce/xfdb/32709
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.