Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0919
The remote host is missing updates announced in
advisory RHSA-2010:0919.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.

An input validation flaw was discovered in the PHP session serializer. If a
PHP script generated session variable names from untrusted user input, a
remote attacker could use this flaw to inject an arbitrary variable into
the PHP session. (CVE-2010-3065)

An information leak flaw was discovered in the PHP var_export() function
implementation. If some fatal error occurred during the execution of this
function (such as the exhaustion of memory or script execution time limit),
part of the function's output was sent to the user as script output,
possibly leading to the disclosure of sensitive information.

A numeric truncation error and an input validation flaw were found in the
way the PHP utf8_decode() function decoded partial multi-byte sequences
for some multi-byte encodings, sending them to output without them being
escaped. An attacker could use these flaws to perform a cross-site
scripting attack. (CVE-2009-5016, CVE-2010-3870)

It was discovered that the PHP lcg_value() function used insufficient
entropy to seed the pseudo-random number generator. A remote attacker could
possibly use this flaw to predict values returned by the function, which
are used to generate session identifiers by default. This update changes
the function's implementation to use more entropy during seeding.

It was discovered that the PHP fnmatch() function did not restrict the
length of the pattern argument. A remote attacker could use this flaw to
crash the PHP interpreter where a script used fnmatch() on untrusted
matching patterns. (CVE-2010-1917)

A NULL pointer dereference flaw was discovered in the PHP XML-RPC
extension. A malicious XML-RPC client or server could use this flaw to
crash the PHP interpreter via a specially-crafted XML-RPC request.

All php users should upgrade to these updated packages, which contain
backported patches to resolve these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-5016
BugTraq ID: 44889
Common Vulnerability Exposure (CVE) ID: CVE-2010-0397
BugTraq ID: 38708
SuSE Security Announcement: SUSE-SR:2010:012 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:017 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-1128
BugTraq ID: 38430
Common Vulnerability Exposure (CVE) ID: CVE-2010-1917
Debian Security Information: DSA-2089 (Google Search)
HPdes Security Advisory: HPSBMA02662
HPdes Security Advisory: SSRT100409
SuSE Security Announcement: SUSE-SR:2010:018 (Google Search)
XForce ISS Database: php-fnmatchfunction-dos(58585)
Common Vulnerability Exposure (CVE) ID: CVE-2010-2531
Debian Security Information: DSA-2266 (Google Search)
HPdes Security Advisory: HPSBOV02763
HPdes Security Advisory: SSRT100826
Common Vulnerability Exposure (CVE) ID: CVE-2010-3065
Common Vulnerability Exposure (CVE) ID: CVE-2010-3870
BugTraq ID: 44605
SuSE Security Announcement: SUSE-SR:2010:023 (Google Search)
CopyrightCopyright (c) 2010 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.