Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58335
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1283-1)
Summary:The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-1283-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-1283-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1286

Stefan Esser discovered an overflow in the object reference handling code of the unserialize() function, which allows the execution of arbitrary code if malformed input is passed from an application.

CVE-2007-1375

Stefan Esser discovered that an integer overflow in the substr_compare() function allows information disclosure of heap memory.

CVE-2007-1376

Stefan Esser discovered that insufficient validation of shared memory functions allows the disclosure of heap memory.

CVE-2007-1380

Stefan Esser discovered that the session handler performs insufficient validation of variable name length values, which allows information disclosure through a heap information leak.

CVE-2007-1453

Stefan Esser discovered that the filtering framework performs insufficient input validation, which allows the execution of arbitrary code through a buffer underflow.

CVE-2007-1454

Stefan Esser discovered that the filtering framework can be bypassed with a special whitespace character.

CVE-2007-1521

Stefan Esser discovered a double free vulnerability in the session_regenerate_id() function, which allows the execution of arbitrary code.

CVE-2007-1583

Stefan Esser discovered that a programming error in the mb_parse_str() function allows the activation of register_globals.

CVE-2007-1700

Stefan Esser discovered that the session extension incorrectly maintains the reference count of session variables, which allows the execution of arbitrary code.

CVE-2007-1711

Stefan Esser discovered a double free vulnerability in the session management code, which allows the execution of arbitrary code.

CVE-2007-1718

Stefan Esser discovered that the mail() function performs insufficient validation of folded mail headers, which allows mail header injection.

CVE-2007-1777

Stefan Esser discovered that the extension to handle ZIP archives performs insufficient length checks, which allows the execution of arbitrary code.

CVE-2007-1824

Stefan Esser discovered an off-by-one error in the filtering framework, which allows the execution of arbitrary code.

CVE-2007-1887

Stefan Esser discovered that a buffer overflow in the sqlite extension allows the execution of arbitrary code.

CVE-2007-1889

Stefan Esser discovered that the PHP memory manager performs an incorrect type cast, which allows the execution of arbitrary code through buffer overflows.

CVE-2007-1900

Stefan Esser discovered that incorrect validation in the email filter extension allows the injection of mail headers.

The oldstable distribution (sarge) doesn't include php5.

For the stable distribution (etch) these problems have been fixed in version 5.2.0-8+etch3.

For the unstable ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'php5' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:C/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1286
BugTraq ID: 22765
http://www.securityfocus.com/bid/22765
Bugtraq: 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/466166/100/0/threaded
Debian Security Information: DSA-1282 (Google Search)
http://www.debian.org/security/2007/dsa-1282
Debian Security Information: DSA-1283 (Google Search)
http://www.debian.org/security/2007/dsa-1283
http://security.gentoo.org/glsa/glsa-200703-21.xml
http://security.gentoo.org/glsa/glsa-200705-19.xml
HPdes Security Advisory: HPSBMA02215
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
HPdes Security Advisory: HPSBTU02232
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
HPdes Security Advisory: SSRT071423
HPdes Security Advisory: SSRT071429
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
http://www.php-security.org/MOPB/MOPB-04-2007.html
http://www.osvdb.org/32771
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11575
RedHat Security Advisories: RHSA-2007:0154
http://rhn.redhat.com/errata/RHSA-2007-0154.html
RedHat Security Advisories: RHSA-2007:0155
http://rhn.redhat.com/errata/RHSA-2007-0155.html
RedHat Security Advisories: RHSA-2007:0163
http://rhn.redhat.com/errata/RHSA-2007-0163.html
http://secunia.com/advisories/24419
http://secunia.com/advisories/24606
http://secunia.com/advisories/24910
http://secunia.com/advisories/24924
http://secunia.com/advisories/24941
http://secunia.com/advisories/24945
http://secunia.com/advisories/25025
http://secunia.com/advisories/25062
http://secunia.com/advisories/25423
http://secunia.com/advisories/25445
http://secunia.com/advisories/25850
http://www.trustix.org/errata/2007/0009/
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
XForce ISS Database: php-zval-code-execution(32796)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32796
Common Vulnerability Exposure (CVE) ID: CVE-2007-1375
BugTraq ID: 22851
http://www.securityfocus.com/bid/22851
https://www.exploit-db.com/exploits/3424
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.php-security.org/MOPB/MOPB-14-2007.html
http://www.osvdb.org/32780
http://secunia.com/advisories/25056
http://secunia.com/advisories/25057
http://secunia.com/advisories/26895
SuSE Security Announcement: SUSE-SA:2007:032 (Google Search)
http://www.novell.com/linux/security/advisories/2007_32_php.html
http://www.ubuntu.com/usn/usn-455-1
Common Vulnerability Exposure (CVE) ID: CVE-2007-1376
BugTraq ID: 22862
http://www.securityfocus.com/bid/22862
https://www.exploit-db.com/exploits/3426
https://www.exploit-db.com/exploits/3427
http://www.php-security.org/MOPB/MOPB-15-2007.html
http://www.osvdb.org/32781
Common Vulnerability Exposure (CVE) ID: CVE-2007-1380
BugTraq ID: 22805
http://www.securityfocus.com/bid/22805
https://www.exploit-db.com/exploits/3413
http://www.php-security.org/MOPB/MOPB-10-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10792
http://secunia.com/advisories/24514
SuSE Security Announcement: SUSE-SA:2007:020 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-1453
BugTraq ID: 22922
http://www.securityfocus.com/bid/22922
http://www.php-security.org/MOPB/MOPB-19-2007.html
http://www.php.net/releases/5_2_1.php
Common Vulnerability Exposure (CVE) ID: CVE-2007-1454
BugTraq ID: 22914
http://www.securityfocus.com/bid/22914
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
http://www.php-security.org/MOPB/MOPB-18-2007.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-1521
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
BugTraq ID: 22968
http://www.securityfocus.com/bid/22968
BugTraq ID: 25159
http://www.securityfocus.com/bid/25159
http://www.php-security.org/MOPB/MOPB-22-2007.html
http://secunia.com/advisories/24505
http://secunia.com/advisories/26235
http://www.vupen.com/english/advisories/2007/0960
http://www.vupen.com/english/advisories/2007/2732
Common Vulnerability Exposure (CVE) ID: CVE-2007-1522
BugTraq ID: 22971
http://www.securityfocus.com/bid/22971
http://www.php-security.org/MOPB/MOPB-23-2007.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-1583
BugTraq ID: 23016
http://www.securityfocus.com/bid/23016
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
http://www.php-security.org/MOPB/MOPB-26-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10245
http://www.redhat.com/support/errata/RHSA-2007-0153.html
http://www.redhat.com/support/errata/RHSA-2007-0162.html
http://secunia.com/advisories/24909
http://secunia.com/advisories/24965
Common Vulnerability Exposure (CVE) ID: CVE-2007-1700
BugTraq ID: 23119
http://www.securityfocus.com/bid/23119
http://www.php-security.org/MOPB/MOPB-30-2007.html
XForce ISS Database: php-session-extension-code-execution(33520)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33520
Common Vulnerability Exposure (CVE) ID: CVE-2007-1711
BugTraq ID: 23121
http://www.securityfocus.com/bid/23121
http://www.php-security.org/MOPB/MOPB-32-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10406
XForce ISS Database: php-deserializer-code-execution(33575)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33575
Common Vulnerability Exposure (CVE) ID: CVE-2007-1718
BugTraq ID: 23145
http://www.securityfocus.com/bid/23145
http://www.php-security.org/MOPB/MOPB-34-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951
http://www.securitytracker.com/id?1017946
XForce ISS Database: php-mailfunction-header-injection(33516)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33516
Common Vulnerability Exposure (CVE) ID: CVE-2007-1777
BugTraq ID: 23169
http://www.securityfocus.com/bid/23169
http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
http://www.php-security.org/MOPB/MOPB-35-2007.html
XForce ISS Database: php-zipreadentry-bo(33652)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33652
Common Vulnerability Exposure (CVE) ID: CVE-2007-1824
BugTraq ID: 23237
http://www.securityfocus.com/bid/23237
http://www.php-security.org/MOPB/MOPB-42-2007.html
XForce ISS Database: php-phpstreamfiltercreate-bo(33729)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33729
Common Vulnerability Exposure (CVE) ID: CVE-2007-1887
BugTraq ID: 23235
http://www.securityfocus.com/bid/23235
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
http://www.php-security.org/MOPB/MOPB-41-2007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5348
http://secunia.com/advisories/27037
http://secunia.com/advisories/27102
http://secunia.com/advisories/27110
http://www.vupen.com/english/advisories/2007/2016
http://www.vupen.com/english/advisories/2007/3386
XForce ISS Database: php-sqlitedecodebinary-bo(33766)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33766
Common Vulnerability Exposure (CVE) ID: CVE-2007-1889
BugTraq ID: 23238
http://www.securityfocus.com/bid/23238
http://www.php-security.org/MOPB/MOPB-43-2007.html
http://www.php-security.org/MOPB/MOPB-44-2007.html
XForce ISS Database: zend-zendmmallocint-bo(33770)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33770
Common Vulnerability Exposure (CVE) ID: CVE-2007-1900
BugTraq ID: 23359
http://www.securityfocus.com/bid/23359
http://www.php-security.org/MOPB/PMOPB-45-2007.html
http://www.osvdb.org/33962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067
http://secunia.com/advisories/24824
http://secunia.com/advisories/25535
http://secunia.com/advisories/26231
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
http://www.trustix.org/errata/2007/0023/
XForce ISS Database: php-filtervalidateemail-header-injection(33510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33510
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.