Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58334
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1282-1)
Summary:The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-1282-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-1282-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1286

Stefan Esser discovered an overflow in the object reference handling code of the unserialize() function, which allows the execution of arbitrary code if malformed input is passed from an application.

CVE-2007-1380

Stefan Esser discovered that the session handler performs insufficient validation of variable name length values, which allows information disclosure through a heap information leak.

CVE-2007-1521

Stefan Esser discovered a double free vulnerability in the session_regenerate_id() function, which allows the execution of arbitrary code.

CVE-2007-1711

Stefan Esser discovered a double free vulnerability in the session management code, which allows the execution of arbitrary code.

CVE-2007-1718

Stefan Esser discovered that the mail() function performs insufficient validation of folded mail headers, which allows mail header injection.

CVE-2007-1777

Stefan Esser discovered that the extension to handle ZIP archives performs insufficient length checks, which allows the execution of arbitrary code.

For the oldstable distribution (sarge) these problems have been fixed in version 4.3.10-20.

For the stable distribution (etch) these problems have been fixed in version 4.4.4-8+etch2.

For the unstable distribution (sid) these problems have been fixed in version 4.4.6-1. php4 will be removed from sid, thus you are strongly advised to migrate to php5 if you prefer to follow the unstable distribution.

We recommend that you upgrade your PHP packages. Packages for the arm, m68k, mips and mipsel architectures are not yet available. They will be provided later.

Affected Software/OS:
'php4' package(s) on Debian 3.1, Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:C/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1286
BugTraq ID: 22765
http://www.securityfocus.com/bid/22765
Bugtraq: 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/466166/100/0/threaded
Debian Security Information: DSA-1282 (Google Search)
http://www.debian.org/security/2007/dsa-1282
Debian Security Information: DSA-1283 (Google Search)
http://www.debian.org/security/2007/dsa-1283
http://security.gentoo.org/glsa/glsa-200703-21.xml
http://security.gentoo.org/glsa/glsa-200705-19.xml
HPdes Security Advisory: HPSBMA02215
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
HPdes Security Advisory: HPSBTU02232
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
HPdes Security Advisory: SSRT071423
HPdes Security Advisory: SSRT071429
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.php-security.org/MOPB/MOPB-04-2007.html
http://www.osvdb.org/32771
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575
RedHat Security Advisories: RHSA-2007:0154
http://rhn.redhat.com/errata/RHSA-2007-0154.html
RedHat Security Advisories: RHSA-2007:0155
http://rhn.redhat.com/errata/RHSA-2007-0155.html
RedHat Security Advisories: RHSA-2007:0163
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24419
http://secunia.com/advisories/24606
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25025
http://secunia.com/advisories/25062
http://secunia.com/advisories/25423
http://secunia.com/advisories/25445
http://secunia.com/advisories/25850
http://www.trustix.org/errata/2007/0009/
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
XForce ISS Database: php-zval-code-execution(32796)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32796
Common Vulnerability Exposure (CVE) ID: CVE-2007-1380
BugTraq ID: 22805
http://www.securityfocus.com/bid/22805
https://www.exploit-db.com/exploits/3413
http://www.php-security.org/MOPB/MOPB-10-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10792
http://secunia.com/advisories/24514
http://secunia.com/advisories/25056
http://secunia.com/advisories/25057
SuSE Security Announcement: SUSE-SA:2007:020 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
SuSE Security Announcement: SUSE-SA:2007:032 (Google Search)
http://www.novell.com/linux/security/advisories/2007_32_php.html
http://www.ubuntu.com/usn/usn-455-1
Common Vulnerability Exposure (CVE) ID: CVE-2007-1521
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
BugTraq ID: 22968
http://www.securityfocus.com/bid/22968
BugTraq ID: 25159
http://www.securityfocus.com/bid/25159
http://www.php-security.org/MOPB/MOPB-22-2007.html
http://secunia.com/advisories/24505
http://secunia.com/advisories/26235
http://www.vupen.com/english/advisories/2007/0960
http://www.vupen.com/english/advisories/2007/2732
Common Vulnerability Exposure (CVE) ID: CVE-2007-1583
BugTraq ID: 23016
http://www.securityfocus.com/bid/23016
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
http://www.php-security.org/MOPB/MOPB-26-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245
http://www.redhat.com/support/errata/RHSA-2007-0153.html
http://www.redhat.com/support/errata/RHSA-2007-0162.html
http://secunia.com/advisories/24909
http://secunia.com/advisories/24965
Common Vulnerability Exposure (CVE) ID: CVE-2007-1711
BugTraq ID: 23121
http://www.securityfocus.com/bid/23121
http://www.php-security.org/MOPB/MOPB-32-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10406
XForce ISS Database: php-deserializer-code-execution(33575)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33575
Common Vulnerability Exposure (CVE) ID: CVE-2007-1718
BugTraq ID: 23145
http://www.securityfocus.com/bid/23145
http://www.php-security.org/MOPB/MOPB-34-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951
http://www.securitytracker.com/id?1017946
XForce ISS Database: php-mailfunction-header-injection(33516)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33516
Common Vulnerability Exposure (CVE) ID: CVE-2007-1777
BugTraq ID: 23169
http://www.securityfocus.com/bid/23169
http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
http://www.php-security.org/MOPB/MOPB-35-2007.html
XForce ISS Database: php-zipreadentry-bo(33652)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33652
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.