English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66610
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: php5
Summary:FreeBSD Ports: php5
Description:The remote host is missing an update to the system
as announced in the referenced advisory.

The following package is affected: php5

CVE-2009-3557
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and
5.3.x before 5.3.1 allows context-dependent attackers to bypass
safe_mode restrictions, and create files in group-writable or
world-writable directories, via the dir and prefix arguments.

CVE-2009-3558
The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12
and 5.3.x before 5.3.1 allows context-dependent attackers to bypass
open_basedir restrictions, and create FIFO files, via the pathname and
mode arguments, as demonstrated by creating a .htaccess file.

CVE-2009-4017
PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number
of temporary files created when handling a multipart/form-data POST
request, which allows remote attackers to cause a denial of service
(resource exhaustion), and makes it easier for remote attackers to
exploit local file inclusion vulnerabilities, via multiple requests,
related to lack of support for the max_file_uploads directive.

CVE-2009-4142
The htmlspecialchars function in PHP before 5.2.12 does not properly
handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences,
and (3) invalid EUC-JP sequences, which allows remote attackers to
conduct cross-site scripting (XSS) attacks by placing a crafted byte
sequence before a special character.

CVE-2009-4143
PHP before 5.2.12 does not properly handle session data, which has
unspecified impact and attack vectors related to (1) interrupt
corruption of the SESSION superglobal array and (2) the
session.save_path directive.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://www.php.net/releases/5_2_12.php
http://www.vuxml.org/freebsd/39a25a63-eb5c-11de-b650-00215c6a37bb.html
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3557
http://www.openwall.com/lists/oss-security/2009/11/20/2
http://www.openwall.com/lists/oss-security/2009/11/20/3
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://news.php.net/php.announce/79
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
HPdes Security Advisory: HPSBUX02543
http://marc.info/?l=bugtraq&m=127680701405735&w=2
HPdes Security Advisory: SSRT100152
http://www.mandriva.com/security/advisories?name=MDVSA-2009:302
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
http://www.mandriva.com/security/advisories?name=MDVSA-2009:303
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7396
http://secunia.com/advisories/37412
http://secunia.com/advisories/37821
http://secunia.com/advisories/40262
http://securityreason.com/securityalert/6601
http://www.vupen.com/english/advisories/2009/3593
Common Vulnerability Exposure (CVE) ID: CVE-2009-3558
http://securityreason.com/securityalert/6600
Common Vulnerability Exposure (CVE) ID: CVE-2009-4017
Bugtraq: 20091120 PHP "multipart/form-data" denial of service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507982/100/0/threaded
http://seclists.org/fulldisclosure/2009/Nov/228
http://www.openwall.com/lists/oss-security/2009/11/20/7
http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/
Debian Security Information: DSA-1940 (Google Search)
http://www.debian.org/security/2009/dsa-1940
HPdes Security Advisory: HPSBMA02568
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
HPdes Security Advisory: SSRT100219
http://www.mandriva.com/security/advisories?name=MDVSA-2009:305
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10483
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6667
http://secunia.com/advisories/37482
http://secunia.com/advisories/41480
http://secunia.com/advisories/41490
XForce ISS Database: php-multipart-formdata-dos(54455)
http://xforce.iss.net/xforce/xfdb/54455
Common Vulnerability Exposure (CVE) ID: CVE-2009-4142
Debian Security Information: DSA-2001 (Google Search)
http://www.debian.org/security/2010/dsa-2001
BugTraq ID: 37389
http://www.securityfocus.com/bid/37389
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10005
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7085
http://securitytracker.com/id?1023372
http://secunia.com/advisories/38648
Common Vulnerability Exposure (CVE) ID: CVE-2009-4143
http://www.mandriva.com/security/advisories?name=MDVSA-2010:045
BugTraq ID: 37390
http://www.securityfocus.com/bid/37390
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7439
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.