Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58452
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1331-1)
Summary:The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-1331-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-1331-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-0207

Stefan Esser discovered HTTP response splitting vulnerabilities in the session extension. This only affects Debian 3.1 (Sarge).

CVE-2006-4486

Stefan Esser discovered that an integer overflow in memory allocation routines allows the bypass of memory limit restrictions. This only affects Debian 3.1 (Sarge) on 64 bit architectures.

CVE-2007-1864

It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.

For the oldstable distribution (sarge) these problems have been fixed in version 4.3.10-22.

For the stable distribution (etch) these problems have been fixed in version 4.4.4-8+etch4.

The unstable distribution (sid) no longer contains php4.

We recommend that you upgrade your PHP packages. Sarge packages for hppa, mips and powerpc are not yet available, due to problems on the build hosts. They will be provided later.

Affected Software/OS:
'php4' package(s) on Debian 3.1, Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0207
BugTraq ID: 16220
http://www.securityfocus.com/bid/16220
Bugtraq: 20060112 Advisory 01/2006: PHP ext/session HTTP Response Splitting Vulnerability (Google Search)
Debian Security Information: DSA-1331 (Google Search)
http://www.debian.org/security/2007/dsa-1331
http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:028
http://www.hardened-php.net/advisory_012006.112.html
http://securitytracker.com/id?1015484
http://secunia.com/advisories/18431
http://secunia.com/advisories/18697
http://secunia.com/advisories/19012
http://secunia.com/advisories/19179
http://secunia.com/advisories/19355
http://secunia.com/advisories/25945
SuSE Security Announcement: SUSE-SR:2006:004 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
https://usn.ubuntu.com/261-1/
http://www.vupen.com/english/advisories/2006/0177
http://www.vupen.com/english/advisories/2006/0369
XForce ISS Database: php-session-response-splitting(24094)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24094
Common Vulnerability Exposure (CVE) ID: CVE-2006-4486
BugTraq ID: 19582
http://www.securityfocus.com/bid/19582
Bugtraq: 20061005 rPSA-2006-0182-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/447866/100/0/threaded
http://www.hardened-php.net/hphp/changelog.html#hardening_patch_0.4.14
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11086
http://www.redhat.com/support/errata/RHSA-2006-0669.html
http://www.redhat.com/support/errata/RHSA-2006-0682.html
RedHat Security Advisories: RHSA-2006:0688
http://rhn.redhat.com/errata/RHSA-2006-0688.html
http://securitytracker.com/id?1016984
http://secunia.com/advisories/21546
http://secunia.com/advisories/22004
http://secunia.com/advisories/22069
http://secunia.com/advisories/22225
http://secunia.com/advisories/22331
http://secunia.com/advisories/22440
http://secunia.com/advisories/22487
http://secunia.com/advisories/22538
SGI Security Advisory: 20061001-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
SuSE Security Announcement: SUSE-SA:2006:052 (Google Search)
http://www.novell.com/linux/security/advisories/2006_52_php.html
TurboLinux Advisory: TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.ubuntu.com/usn/usn-362-1
Common Vulnerability Exposure (CVE) ID: CVE-2007-1864
1018024
http://www.securitytracker.com/id?1018024
2007-0017
http://www.trustix.org/errata/2007/0017/
23813
http://www.securityfocus.com/bid/23813
25187
http://secunia.com/advisories/25187
25191
http://secunia.com/advisories/25191
25255
http://secunia.com/advisories/25255
25445
http://secunia.com/advisories/25445
25660
http://secunia.com/advisories/25660
25938
http://secunia.com/advisories/25938
25945
26048
http://secunia.com/advisories/26048
26102
http://secunia.com/advisories/26102
27377
http://secunia.com/advisories/27377
34674
http://osvdb.org/34674
ADV-2007-2187
http://www.vupen.com/english/advisories/2007/2187
DSA-1330
http://www.debian.org/security/2007/dsa-1330
DSA-1331
GLSA-200705-19
http://security.gentoo.org/glsa/glsa-200705-19.xml
MDKSA-2007:102
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
MDKSA-2007:103
http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
RHSA-2007:0348
https://rhn.redhat.com/errata/RHSA-2007-0348.html
RHSA-2007:0349
http://www.redhat.com/support/errata/RHSA-2007-0349.html
RHSA-2007:0355
http://www.redhat.com/support/errata/RHSA-2007-0355.html
SUSE-SA:2007:044
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
USN-485-1
http://www.ubuntu.com/usn/usn-485-1
http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
http://us2.php.net/releases/4_4_7.php
http://us2.php.net/releases/5_2_2.php
https://issues.rpath.com/browse/RPL-1693
oval:org.mitre.oval:def:11257
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11257
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.