Description: | Summary: The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-1578-1 advisory.
Vulnerability Insight: Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-3799
The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters.
CVE-2007-3806
A denial of service was possible through a malicious script abusing the glob() function.
CVE-2007-3998
Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack.
CVE-2007-4657
Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service.
CVE-2008-2051
The escapeshellcmd API function could be attacked via incomplete multibyte chars.
For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6.
The php4 packages are no longer present the unstable distribution (sid).
We recommend that you upgrade your php4 package.
Affected Software/OS: 'php4' package(s) on Debian 4.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|